HIPAA Breaches Rising
HIPAA breaches have increased exponentially as health information is extremely valuable on the black market. It seems like there is a new data breach in the news every day, [...]
HIPAA breaches have increased exponentially as health information is extremely valuable on the black market. It seems like there is a new data breach in the news every day, [...]
Data breaches can cost more than an organization would think. IBM Security’s annual study analyzed data breaches and the financial impact associated with them. It was [...]
Presbyterian Healthcare Services is the latest victim of phishing attacks in the healthcare industry. A healthcare phishing attack occurs when unauthorized access to an organization's network is gained by [...]
The Health Insurance Portability and Accountability Act (HIPAA) mandates safeguards to be in place to secure protected health information (PHI). PHI is any individually identifying health information such as [...]
Implementing effective HIPAA cybersecurity measures is essential to safeguarding protected health information (PHI). However, according to a recent study conducted by Brigham Women's Hospital and Harvard Medical School, many [...]
The HIPAA data breach that won’t go away has claimed another victim. In June of 2019, business associate (BA) and vendor America Medical Collection Agency (AMCA), [...]
The Health Insurance Portability and Accountability Act (HIPAA) dictates healthcare standards for how protected health information (PHI) is handled and safeguarded. The Department of Health and [...]
Medical Informatics Engineering, Inc. (MIE) is an Indiana-based company that develops and offers solutions enabling the exchange of electronic protected health information (ePHI). In May of [...]
Similar to the United States’ HIPAA law, the General Data Protection Regulation (GDPR), enacted in 2016, protects Europeans’ personal data. HIPAA and GDPR require many of [...]
In light of recent large-scale breaches in healthcare, it is imperative that covered entities (CEs) understand the importance of business associate security. Over the course of [...]