Cyber-Security: Best Practices – Short and Sweat!

Yes, that said swEAt, not swEEt.  If you think there is anything sweet about cyber-security you haven't been in it long enough.  The good news is the Australian government came up with a very short list of key strategies for cyber-security best practices.  This is straight from Marc Goodman's book Future Crimes.Application white listing - only allow specifically authorized programs to run on your system and block all unknown executable files and installation routines.  Doing so prevents malic ...

HIPAA – Enemy #1 = Do Nothing

What is the biggest obstacle to HIPAA Compliance? Do Nothing! It’s the #1 enemy of HIPAA compliance and Healthcare practices.Anyone that has checked into HIPAA in the past few years can see that action is necessary to address new requirements and fend off potentially harsh fines. With minimal cost and effort, a practice can deploy cyber-breach detection software and perform a risk assessment that will drastically improve their compliance and greatly reduce their likelihood of losing valuable ePHI. Ho ...

Cyber Breach – No One is Immune

This article is the first in a three-part series from Third Rock, a leading HIPAA Compliance and Risk Management provider, explaining the magnitude and business impact of cyber security breaches as well as steps you can take to protect your records and your organization.Recent headlines have reported that cyber breaches are occurring with greater frequency than ever before. Everyone is familiar with the cyber breaches of Target, Home Depot, JP Morgan, Sony, and most recently, the federal Office of Perso ...

Healthcare Information Security: Have you been breached?

The Ponemon Institute1 reports that approximately 91% of healthcare organizations (“covered entities”) have experienced an information breach in the past year and an additional 38% have suffered more than five data breaches in the past two years! During the same time period, 59% of business associates have been breached, and 15% have been breached five or more times.*It is estimated that 20 to 30% of providers have been breached and may not yet even be aware that a breach has occurred. According to ...

2015 – The Healthcare Hack

Just a short post before the New Year!The writing is on the wall. If you look at predictions and reports from all of the security organizations, the one thing that is clear is that Healthcare will find itself the major target of hackers in 2015. As of 2013, it is reported that 43% of all data breaches involved healthcare data. That is only going to get worse!Why is healthcare such a primer target? Simple, medical records contain a lot of information about your patients identity. This allows for iden ...

Road Blocks to Creating Your Contingency Plan

Why Everyone Needs Help Creating a BC/DR (Contingency) Plan Creating a contingency plan is a huge undertaking.  It’s a major project for any company, small or large.  It’s a major project for any company, small or large; an integration effort which requires a large amount of time from experts across the company and often outside the company, including executives, managers, staff, vendors and consultants.While creating a contingency plan for a large health care provider I realized part of the pro ...

HIPAA Compliance – The Moving Finish Line

The overarching goal of HIPAA compliance is to protect the individual; both the patients’ health and their finances. Protection of the patients’ health is ensuring their medical records are not corrupted or lost, and readily available when needed. The financial protection is prevention of identity theft and other cyber-crimes.HIPAA began as a law to enable an individual to maintain health insurance when changing jobs but with the addition of federal and state regulations, and the HITECH act, it has ...

Outgrowing the “As Needed” Technology

All organizations have been there, that start-up company that is more worried about making a profit than what its technology plan is for the next year, let alone three plus years. When you are a small company with a few employees or maybe even just yourself, it is easy to get in to the routine of simply grabbing a solution to fit the need you have at that moment.Honestly, there is no reason to even try to change someone’s mind that is going about their technology purchases in an “as needed” basis. ...