<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Compliance Technology Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/compliance-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/compliance-technology/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 02 Jul 2019 12:08:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Compliance Technology Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/compliance-technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Cybersecurity: Have you hardened your systems?</title>
		<link>https://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 25 Apr 2017 14:00:15 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3568</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/">Cybersecurity: Have you hardened your systems?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="wp-image-3577 alignleft" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard.jpg?resize=186%2C124&#038;ssl=1" alt="" width="186" height="124" scale="0" /></p>
<p>We perform HIPAA Risk Assessments (Security Risk Analysis) for very small practices to large healthcare organizations, plus business associates that include software, big data, and marketing companies.  We know the focus of the assessment needs to be security; therefore, we run an industry standard (NIST based) scan checking computers for HIPAA compliance.  (NIST stands for National Institute of Standards and Technology) Our findings show that the average covered entity is about 15% compliant and the Windows Operating System is about 63% compliant against the NIST test.  It&#8217;s obvious to us that cybersecurity has not been addressed.</p>
<p>If you&#8217;re a covered entity or a business associate, you might ask, &#8220;How do we improve these findings and correct these issues?&#8221;</p>
<p>It&#8217;s actually not too difficult.</p>
<ol>
<li>Make sure your software is up-to-date.  You should have &#8220;auto-update&#8221; turned on for operating systems, anti-virus software, and applications.</li>
<li>Ensure that your backups are (a) current, (b) secure, (c) off-site, and that they work. Test the backups on a daily basis to make sure they have not been encrypted by ransomware.</li>
<li>Correct the deficiencies of the Windows operating system, including setting up password policies.  Utilizing a domain is wise.</li>
<li>Hire competent IT staff or a Managed Service Provider to provide consistent service for your computers and network.  Paying for assistance only when you have a problem means no one is monitoring your network or computers on a regular basis.</li>
<li>Make sure your network has been locked down. Change firewall logins regularly, and use strong passwords.  Hide or turn off WIFI broadcasting and use strong passwords.  Do NOT allow guests onto the company network.</li>
<li>If you&#8217;re a larger covered entity, you should consider hiring a Managed Security Services Provider (MSSP).</li>
</ol>
<p> <span style="font-size: 12px;">Hope this helps you think about cyber security in a new light and to take action to Protect Your Patients, Protect Your Practice, and Protect Yourself.</span></p>
<p>If you have any questions drop us an email at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.  We&#8217;re happy to help!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/">Cybersecurity: Have you hardened your systems?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3568</post-id>	</item>
		<item>
		<title>Culture of Compliance Awarded to The Urology Team</title>
		<link>https://thirdrock.com/blog/2017/02/14/culture-of-compliance-awarded-to-the-urology-team/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 14 Feb 2017 15:00:28 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[book of evidence]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[The Urology Team]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2958</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/02/14/culture-of-compliance-awarded-to-the-urology-team/">Culture of Compliance Awarded to The Urology Team</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="wp-image-2969 size-medium" style="margin-bottom: 0px; margin-left: 0px; margin-top: 0px; float: right;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Ada-and-Cindy-The-Urology-Team.png?resize=225%2C300&#038;ssl=1" width="225" height="300" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Ada-and-Cindy-The-Urology-Team.png?resize=225%2C300&amp;ssl=1 225w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Ada-and-Cindy-The-Urology-Team.png?w=345&amp;ssl=1 345w" sizes="(max-width: 225px) 100vw, 225px" />Third Rock is pleased to recognize The Urology Team, a well-known and respected Austin-based medical practice, with the <em>Culture of Compliance</em> <em>Award</em>. This is the first time Third Rock has presented this award which recognizes healthcare providers who have embraced HIPAA privacy and security practices so thoroughly that they are ingrained in their corporate culture and standard processes.</p>
<p>The Urology Team engaged Third Rock to perform their annual Security Risk Assessment which was completed in December 2016. After completing the on-site assessment and reviewing the findings, we were very impressed with their knowledge of HIPAA requirements and the extent to which they had successfully implemented them. We decided to make The Urology Team the first recipient of the <em>Culture of Compliance Award.</em></p>
<p>How was The Urology Team able to reach such a high level of compliance? First and foremost, they assigned authority to implement and enforce HIPAA-compliant processes. The Providers, who also own the practice, gave Ada, the Privacy Officer, and Cindy, the Security Officer, authority to implement and manage HIPAA. Both Ada and Cindy take their responsibilities to protect patient data very seriously. They have adopted HIPAA Policies and Procedures, which are available to the entire staff, and in doing so, they have learned to manage risks and be on the lookout for new threats.</p>
<p> Each member of the workforce completes HIPAA training annually, or more often, and Ada and Cindy provide regular HIPAA reminders during team meetings. The ladies have also established a strong relationship with their IT Service Provider, Trinsic Technologies of Austin. They clearly understand the status of their IT systems and have an established IT strategy and plan. Lastly, Ada is maintaining a strong &#8220;book of evidence&#8221;, documenting all of the practice’s HIPAA activities and events.</p>
<p> HIPAA compliance is a never-ending journey, and there are always improvements to be made, but The Urology Team is well positioned for continued success with Ada and Cindy leading the way!</p>
<p> Take our <a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a> to see how compliant you are.</p>
<p>&nbsp;</p>
<p></p>
<p>&nbsp;</p>
<p></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><p>The post <a href="https://thirdrock.com/blog/2017/02/14/culture-of-compliance-awarded-to-the-urology-team/">Culture of Compliance Awarded to The Urology Team</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2958</post-id>	</item>
		<item>
		<title>Focus on Technology: Change Your Router Passwords!</title>
		<link>https://thirdrock.com/blog/2017/01/17/focus-on-technology-change-your-router-passwords/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 15:00:18 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[hipaa]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2884</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/17/focus-on-technology-change-your-router-passwords/">Focus on Technology: Change Your Router Passwords!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">One of the most common services in healthcare is the connection to the internet. With all the focus on security and cyber breaches, one of the most vulnerable pieces on your connection to the internet is what is called the router / gateway. The router / gateway connects your computers and devices to the public internet and in many cases provides the initial security or barrier through the use of a built-in firewall.</p>
<p>The problem is, that while this is the door, the gateway to the internet, it is a two way door. Much like the door on your office or building, if it is not properly secured anyone can walk in. What makes this such an issue is the Internet Service Providers (ISP) that generally setup the router / gateway for your organization. Larger organizations may or may not take care of this themselves, but small and medium organizations rely on the ISP to do the install and setup.</p>
<h3>Here comes the major problem!!</h3>
<p>The ISP will generally leave the default username and password for the router / gateway. This means that anyone that gets on your network can simply connect to the router and use the commonly known list of default usernames and passwords to quickly access your router and change the settings to allow them to access your network from anywhere and steal data.</p>
<h3>How to fix this</h3>
<p>You have two options to correct this.</p>
<ol>
<li>Most ISP&#8217;s have instructions on how to access and change the router&#8217;s username and password. You can login and change it yourself.</li>
<li>If you are unsure, contact the ISP and they can walk you through the process.</li>
</ol>
<p>This is a critical issue that is extremely prevalent in many organizations, not just healthcare.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/01/17/focus-on-technology-change-your-router-passwords/">Focus on Technology: Change Your Router Passwords!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2884</post-id>	</item>
		<item>
		<title>Knock, Knock &#8211; We&#8217;re here to perform an onsite HIPAA audit.</title>
		<link>https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/</link>
					<comments>https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/#comments</comments>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 05 Jan 2017 15:04:44 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[electronic documentation]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2773</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/">Knock, Knock &#8211; We&#8217;re here to perform an onsite HIPAA audit.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2801 " style="margin-top: 5px; margin-bottom: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ducks-in-a-row.jpg?resize=275%2C183&#038;ssl=1" width="275" height="183" /></p>
<p>Welcome to 2017.  If you haven&#8217;t heard, the Health and Human Services Office of Civil Rights (OCR) will perform several hundred <strong>on-site</strong> HIPAA audits this year. The possibility of being selected is highly unlikely, but if you are one of the &#8220;lucky&#8221; covered entities that is audited you had better be ready &#8211; with all your ducks in a row. <strong>Current</strong> HIPAA training is only one duck, you need at least four more.  So, prepare to go duck hunting and get them in order sooner rather than later.</p>
<p>There are two very important issues to understand about this new process and the protocol the OCR implemented in 2016. The OCR now requires documented proof that covered entities and business associates have &#8230;</p>
<ol>
<li>Implemented HIPAA specific Policies and Procedures (P&amp;P) in 2016 showing a plan for risk management.</li>
<li>Documentation, including the P&amp;Ps and logs of HIPAA activity, in electronic format for uploading to their web site.</li>
</ol>
<p><strong>Don&#8217;t forget</strong> the OCR expected the following for a HIPAA desk audit starting in 2015 and 2016.</p>
<ol>
<li>A current annual Security Risk Analysis (SRA) based on the OCR SRA questions and/or the NIST 800 standard.  In addition, a risk assessment that includes privacy is needed as well.</li>
<li>Current HIPAA training that includes privacy and cyber security training for all staff with access to PHI and ePHI.</li>
</ol>
<p><strong>The real takeaway?  </strong>The OCR expects to automate auditing and <strong>all covered entities and business associates will be audited by 2019</strong>.  The OCR expects covered entities and business associates to have HIPAA compliance documentation in electronic format starting in 2016.  Make sure your HIPAA report, corrective actions and logs are in electronic format and that you can show improvement in your HIPAA compliance.</p>
<p><strong>Call-To-Action:</strong> If you haven&#8217;t started and done all of the necessary steps to be HIPAA compliant, it&#8217;s time to take action and have a Risk Assessment done immediately and make sure it&#8217;s delivered and available in electronic format, preferably online.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/">Knock, Knock &#8211; We&#8217;re here to perform an onsite HIPAA audit.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thirdrock.com/blog/2017/01/05/knock-knock-were-here-to-perform-an-onsite-hipaa-audit/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2773</post-id>	</item>
		<item>
		<title>Value Proposition of a Next-Generation Compliance Platform (2 of 2)</title>
		<link>https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 14:00:51 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[business operations]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[next-generation management platform]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[value proposition]]></category>
		<category><![CDATA[Worry-Free Compliance]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2323</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/">Value Proposition of a Next-Generation Compliance Platform (2 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2533 " style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Next-Generation.jpg?resize=120%2C90&#038;ssl=1" alt="Next Generation Concept - Golden Color Text on Dark Blue Digital Background." width="120" height="90" /></p>
<p>This is the second in a two part series concerning the value of compliance.  Our mission is, Worry-Free Compliance, to help you obtain a <em><strong>culture of compliance</strong></em> through normal business operations.  Our vision is to reduce the complexity, cost and burden of HIPAA compliance using a next-generation compliance management platform.</p>
<p>What does a next-generation management platform provide?  Here&#8217;s a list:</p>
<ul style="padding-left: 1em;">
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Complete</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Manages the entire compliance process</li>
<li style="text-indent: -1em;">Maintains custom policies and procedures</li>
<li style="text-indent: -1em;">Provides and tracks training</li>
<li style="text-indent: -1em;"><span style="color: #0000ff;"><strong>Creates &amp; maintains Body of Evidence for audits</strong></span></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Simple and Easy</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Understandable format, HIPAA expertise not required</li>
<li style="text-indent: -1em;">Logic driven questions reduces assessment time</li>
<li style="text-indent: -1em;">Supporting documentation easily attached and managed</li>
<li style="text-indent: -1em;"><strong><span style="color: #0000ff;">Generates electronic reports for audits</span></strong></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Significantly Reduces Time and Effort</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Intuitive, step-by-step workflow</li>
<li style="text-indent: -1em;">Provides remediation guidance and support</li>
<li style="text-indent: -1em;">Automates building the body of evidence</li>
<li style="text-indent: -1em;">Reduces man-hours by over 50%</li>
<li style="text-indent: -1em;"><strong><span style="color: #0000ff;">Reduces overall cost of HIPAA compliance by 65%</span></strong></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Greatly reduces liabilities</b></li>
</ul>
</li>
</ul>
<p>Before you buy a HIPAA kit that will sit on your shelves and collect dust or hire a HIPAA auditor/consultant to perform a security risk analysis for you, then leaves you a checklist of issues to correct, you should consider using an online tool that makes you more compliant, in less time and helps you maintain your culture of compliance.</p>
<p>The first post in this two-part series was <a href="http://thirdrock.com/blog/2016/10/13/value-proposition-of-hipaa-compliance-1-of-2/"><em>Value Proposition of HIPAA Compliance</em></a>.</p>
<p>Take our <a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a> to see how compliant you are.</p>
<p><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/">Value Proposition of a Next-Generation Compliance Platform (2 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2323</post-id>	</item>
		<item>
		<title>Protect your patients, protect your practice, protect yourself.</title>
		<link>https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 29 Sep 2016 14:00:10 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2288</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/">Protect your patients, protect your practice, protect yourself.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1668" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Audit-on-blue-puzzle-in-magnifier-c903339_s.jpg?resize=64%2C85&#038;ssl=1" alt="Audit through Lens on Missing Puzzle Peace. Selective Focus. 3D Render." width="64" height="85" scale="0" /></p>
<p>The healthcare industry is beginning to realize that HIPAA is here to stay and they are probably going to be audited sooner or later.  What physicians and all healthcare providers need to understand is that if you don&#8217;t protect your patients&#8217; PHI/ePHI the following can happen to your patients as a result of their identity being stolen and used.</p>
<h4>NOT Protecting Your Patients&#8217; (PHI/ePHI):</h4>
<ol>
<li>You can cause them financial difficulties or even financial ruin.</li>
<li>You can cause them undue stress, even a stroke or heart attack.</li>
<li>You can cause them to be denied healthcare insurance.</li>
<li>You can cause them to be denied healthcare services.</li>
<li>You can cause them to be denied medicines, treatments, and therapies.</li>
<li>You can cause them to be misidentified during healthcare treatment, causing incorrect operations, procedures, medicines, or even death.</li>
<li>You can cause the death of your patient.</li>
<li>You will suffer the consequences listed under &#8220;NOT Protecting Your Practice&#8221;.</li>
</ol>
<p>You might think, these can&#8217;t happen, but all of them have already happened, with the exception of causing a death, but there have been several close calls with death because of identity theft.</p>
<p>What HIPAA &#8220;forces&#8221; you to do, is what you should already be doing:  operating a safe, secure, efficient, productive, and profitable healthcare provider organization.  That&#8217;s right, if you were doing what needs to be done to protect your patients&#8217; PHI/ePHI, you would be HIPAA compliant and you would be protecting your practice (business) and yourself.</p>
<h4>NOT Protecting Your Practice:</h4>
<ol>
<li>You will likely be breached and lose access to or have your patient&#8217;s ePHI stolen.</li>
<li>You will receive the maximum fine from the HHS OCR audit, which may close your doors.</li>
<li>You will likely have a class action lawsuit by your patients against you.</li>
<li>You will have approximately 40% of your patients abandon you and your services.  (People don&#8217;t like having their identity stolen.)</li>
<li>You will have to pay for the remediation of your HIPAA non-compliance issues with government oversight.</li>
<li>You will have to pay for cyber theft protection insurance for all of your patients.</li>
<li>You will suffer from negative social media.</li>
<li>You will suffer major interruption to your cash flow.</li>
</ol>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2276" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/behind-bars.jpg?resize=168%2C122&#038;ssl=1" alt="behind-bars" width="168" height="122" scale="0" />And last but not least, you must realize you need to protect yourself.  The HIPAA law provides for the prosecution of individuals who neglect to protect their patients&#8217; PHI/ePHI or those individuals who destroy, lose, or steal a patient&#8217;s PHI/ePHI. If you don&#8217;t want to wear an orange jump suit you might want to consider working on becoming HIPAA compliant.</p>
<h4>NOT Protecting yourself:</h4>
<ol>
<li>You could find yourself sued by patients.</li>
<li>You could find yourself fined for failure to protect PHI.</li>
<li>You could find yourself found guilty of breaking the law.</li>
<li>You could find yourself in federal prison.</li>
</ol>
<h4><strong><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></strong></h4>
<p>I would strongly suggest you use a Compliance Management Platform to build the required body of evidence, reduce the work load, increase compliance, simplify electronic reporting and save money while working to become HIPAA compliant.  Check out <a href="http://compassdb.com/">CompassDB</a>™ at <a href="http://compassdb.com/">http://compassdb.com/</a>.</p>
<p>If you want to know where you stand with your HIPAA compliance take the <a href="http://cyberquickcheck.com">free HIPAA Quick-Check</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/">Protect your patients, protect your practice, protect yourself.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2288</post-id>	</item>
		<item>
		<title>Focus on Technology: HIPAA Quick Fixes</title>
		<link>https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 27 Sep 2016 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[automatic updates]]></category>
		<category><![CDATA[Quick fix]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2300</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" width="300" height="200" class="alignleft wp-image-2349 size-medium" style="margin-bottom: 20px; margin-right: 10px;" alt="Keep IT Simple" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&#038;ssl=1" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?w=600&amp;ssl=1 600w" sizes="(max-width: 300px) 100vw, 300px" /></a>While meeting all the HIPAA requirements for your technology (computer, network, etc.) requires some planning, there are some quick fixes that can greatly reduce the odds of your organization being breached while at the same time starting you on your path to compliance.</p>
<p>Below are some common issues that we see at all sizes of organizations. How you go about correcting some of them is determined by the size and resources of your organization.</p>
<div style="clear: both;"></div>
<h4>Quick Fix #1</h4>
<p><strong>Issue: The operating system (i.e. Windows) on your organization&#8217;s computers / laptops is out of date. </strong></p>
<p><strong>Details:</strong> Hackers are constantly finding new ways into your computers. If you do not keep your computer up to date, it leaves these vulnerabilities open for attack.</p>
<p><strong>Fix:</strong> For smaller organizations you will need to manually check each of your computers to make sure automatic updates are turned on and updating. Alternatively there are centralized patch management systems that can help, if you are running on a Windows domain.</p>
<h4>Quick Fix #2</h4>
<p><strong>Issue: Weak password! Simple passwords DO NOT WORK!</strong></p>
<p><strong>Details:</strong> Hackers can download a tool off of the internet to crack passwords fairly easily. The weaker the password the more likely the hacker will be able to breach your computer and network.</p>
<p><strong>Fix:</strong> Require that all users have unique accounts and passwords that are a minimum of 12 characters with a mix of UPPERCASE, lowercase, numbers, and at least one special character (i.e. !@#$%^&amp;*). You should also have your users change their password every 90 days max. If you have a Windows domain you can enforce this with a domain policy.</p>
<h4>Quick Fix #3</h4>
<p><strong>Issue: Outdated Antivirus</strong></p>
<p><strong>Details:</strong> Similar to #1, if your antivirus is out of date, your computers and networks are vulnerable to the latest virus&#8217;, malware, and ransomware.</p>
<p><strong>Fix:</strong> Check all of your computer&#8217;s antivirus software to ensure that it still has an active subscription, is running, and is being updated. Most major antivirus companies have business versions of their product that allow you to centrally manage the antivirus and reduce the likelihood of something happening.</p>
<h4>Quick Fix #4</h4>
<p><strong>Issue: Lack of trained staff</strong></p>
<p><strong>Details:</strong> Staff that has not been trained to watch out for malware in emails or on the web is generally the most likely way for your organization to become a victim of malware or ransomware.</p>
<p><strong>Fix:</strong> Ensure the staff is properly trained in HIPAA. There are plenty of online training courses that are neither expensive nor time consuming. While the return on investment may be hidden, it is huge.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2300</post-id>	</item>
		<item>
		<title>Focus on Security: Backups &#8211; The Ultimate Cyber-Security Weapon</title>
		<link>https://thirdrock.com/blog/2016/05/05/focus-on-security-backups-the-ultimate-security/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 05 May 2016 14:00:46 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[covered entities]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1452</guid>

					<description><![CDATA[<p>Backups, we all believe and trust they are being performed regularly and will work if we ever need to restore our business after a natural disaster, malicious attack or cyber-attack, [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/05/focus-on-security-backups-the-ultimate-security/">Focus on Security: Backups &#8211; The Ultimate Cyber-Security Weapon</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1480 alignleft" style="margin-top: 8px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-Backup.-Magnifying-Glass-on-Old-Paper-with-Red-Vertical-Line..jpg?resize=208%2C156&#038;ssl=1" alt="Data Backup. Magnifying Glass on Old Paper with Red Vertical Line." width="208" height="156"></p>
<p>Backups, we all believe and trust they are being performed regularly and will work if we ever need to restore our business after a natural disaster, malicious attack or cyber-attack, such as ransom-ware. &nbsp;The reality is backups are not historically reliable and they become out of sight, out of mind! &nbsp;You need to ensure&nbsp;they are being performed regularly and restoring from the backup media works. ePHI data is highly desirable by criminals because it is worth far more than credit card information on the black market. Because of its value, Covered Entities and Business Associates are now the targets of cyber criminals. With ransomware on a rampage and breaches highly likely, now is the time to take action.</p>
<p>Backups are the ultimate digital security or at least the first priority.</p>
<ol>
<li>Backups protect you from data loss and potential business ruin.
<ul style="margin-left: 15px;">
<li>because of natural disasters</li>
<li>because of human mistakes or malicious acts</li>
<li>because of criminal acts such as ransomware or destructive malware.</li>
</ul>
</li>
<li>They do NOT however, protect you from data theft.
<ul style="margin-left: 15px;">
<li>You still need to take steps to secure your data.</li>
<li>Consider encryption at rest and in motion.</li>
<li>Implement a security plan that includes anti-virus, firewalls, password management, education, HIPAA compliance testing, Vulnerability testing and File Integrity Monitoring.</li>
</ul>
</li>
</ol>
<p>&nbsp;</p>
<p>Steps to a safer more secure data life.</p>
<ol>
<li>Perform backups on a regular schedule; nightly, weekly, monthly and quarterly.</li>
<li>Ensure the backups are stored in a safe and secure location, whether it&#8217;s physical media or offsite or cloud based.
<ul style="margin-left: 15px;">
<li>Do NOT store physical media near heat, water, sunlight or magnetic fields.<img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1479 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-Encryption-Red-over-white-Text-c655360_s.jpg?resize=220%2C165&#038;ssl=1" alt="Data Encryption Concept. The Word of Red Color Located over Text of White Color." width="220" height="165"></li>
<li>Do NOT store data offline or in the cloud without good encryption.</li>
<li>Redundant cloud storage is the most reliable media.</li>
</ul>
</li>
<li>Verify the correct data is being backed up.</li>
<li>Encrypt the backed up data with at least 128&nbsp;bit encryption, but 256 bit would be better.Verify the backed up data can be restored and used.</li>
<li>Check your backup reports daily to make sure the backup worked.</li>
</ol>
<p>Hope this helps ensure you protect your patients, your practice and yourself.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/05/focus-on-security-backups-the-ultimate-security/">Focus on Security: Backups &#8211; The Ultimate Cyber-Security Weapon</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1452</post-id>	</item>
		<item>
		<title>Focus on Technology: ePHI Encryption</title>
		<link>https://thirdrock.com/blog/2016/05/05/focus-on-technology-ephi-encryption/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 05 May 2016 13:30:30 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[SRA]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1501</guid>

					<description><![CDATA[<p>Five years ago encryption was not common, nor cheap.  Today, it&#8217;s everywhere and inexpensive to implement. Yet, healthcare still considers it a nuisance, ignores it or assumes their EHR or [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/05/focus-on-technology-ephi-encryption/">Focus on Technology: ePHI Encryption</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1479" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-Encryption-Red-over-white-Text-c655360_s.jpg?resize=227%2C170&#038;ssl=1" alt="Data Encryption Concept. The Word of Red Color Located over Text of White Color." width="227" height="170" /></p>
<p>Five years ago encryption was not common, nor cheap.  Today, it&#8217;s everywhere and inexpensive to implement. Yet, healthcare still considers it a nuisance, ignores it or assumes their EHR or patient management software provides complete encryption. Consider the fact that ePHI is worth $500 per record and a credit card number is worth $0.50 (50 cents), it&#8217;s time for healthcare providers and their business associates to batten down the hatches on their ePHI.  Cyber criminals want it and will find it.  Meaning they will breach your defenses.  Therefore, <strong>you must defeat the cyber theft from occurring by preventing the data from leaving in a usable format</strong>.  Data encryption is the best way to protect it.  Properly encrypted data is almost impossible to unencrypt, forcing cyber criminals to move on to the next easier set of valuable data.</p>
<p>Steps to take regarding ePHI and encryption:</p>
<ol>
<li>Perform a Security Risk Assessment to identify everywhere you have ePHI.</li>
<li>Create a diagram of the ePHI at rest and in motion.</li>
<li>Create policies and procedures that address protecting, accessing and handling ePHI.</li>
<li>Ensure your software encrypts the ePHI in the database, in transmission and on the client.
<ul>
<li>We have found many EHRs and patient management tools cache unencrypted ePHI on the local hard drive of workstations accessing the information.  This is NOT good.</li>
</ul>
</li>
<li>Encrypt your hard drives</li>
<li>Encrypt your backups.</li>
<li>Check that your encryption is working.</li>
<li>Check that your backups are working.</li>
</ol>
<p>Hope this helps!</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/05/focus-on-technology-ephi-encryption/">Focus on Technology: ePHI Encryption</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1501</post-id>	</item>
		<item>
		<title>Reduce the Burden of HIPAA While Increasing Your Protection</title>
		<link>https://thirdrock.com/blog/2016/05/02/reduce-the-burden-of-hipaa-while-increasing-your-protection/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Mon, 02 May 2016 14:00:55 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[SRA]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1449</guid>

					<description><![CDATA[<p>If you missed our recent webinar on Reduce the Burden of HIPAA While Increasing Your Protection you can watch it on-line now. Ed Jones, Third Rock&#8217;s Chief Compliance Officer, keeps [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/02/reduce-the-burden-of-hipaa-while-increasing-your-protection/">Reduce the Burden of HIPAA While Increasing Your Protection</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you missed our recent webinar on <em><strong>Reduce the Burden of HIPAA While Increasing Your Protection</strong></em> you can watch it on-line now.</p>
<p>Ed Jones, Third Rock&#8217;s Chief Compliance Officer, keeps this presentation updated to help your stay current on HIPAA and cyber-security.  We offer the course to professional associations and local healthcare societies, board of directors and executives and as a Continuing Education (CE) course.  Contact us if you&#8217;re interested in a private webinar with Q&amp;A.</p>
<p>Please join Ed Jones, Chief Compliance Officer and Robert Felps, CEO of Third Rock for a recording of our interactive webinar, from April 28th, that will help you understand:</p>
<ul>
<li>How to reduce the burden of HIPAA Compliance</li>
<li>The reality of cyber-breaches.</li>
<li>Why reducing discovery time of a breach is critical.</li>
<li>Why recent HIPAA regulation changes are important to understand.</li>
<li>How to reduce potential fines for HIPAA non-compliance.</li>
<li>Protecting the equity you’ve built into your business!</li>
</ul>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Practice. Protect Yourself.</strong></p>
<p><iframe loading="lazy" title="HIPAA - Reduce the Burden, Increase Your Protection" width="1080" height="608" src="https://www.youtube.com/embed/lR2slfr7MwQ?feature=oembed"  allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>You may visit our videos page on our web site or our YouTube channel for other videos.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/02/reduce-the-burden-of-hipaa-while-increasing-your-protection/">Reduce the Burden of HIPAA While Increasing Your Protection</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1449</post-id>	</item>
	</channel>
</rss>
