Keep creepy, scary things from landing on your computer! Out of date protection is no protection.
Social media is a reality of doing business today. For healthcare organizations, this raises tricky privacy and compliance issues.
Concluding this series… Your state’s privacy and breach notification statutes may differ from HIPAA regulations.
After a data breach, everything you have done, everything you have discovered, and everything you have reported must be documented.
In Part One of a planned series of articles to look at Incident Response best practices, we start by discussing who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients.
Compliance begins with risk assessment. Security ends with incident response. And peace of mind requires reliable intelligence.
Future HIPAA compliance audits could result in more costly enforcement action. But being prepared is about more than a possible audit.
When hardware or equipment becomes obsolete or simply no longer meets the needs of your company, where does it go? If not handled correctly, the data could cause problems down the road.
Health IT Week has become a rallying point for the healthcare industry to face the challenges of advancing services with expanding technology while maintaining the security and level of service patients require.
An inadequate or infrequent risk assessments can lead to security vulnerabilities or compliance troubles. To protect your company or organization, be sure your security risk assessment hits the bullseye.