Healthcare Breaches Highlight Third-Party Risk, HITECH Compliance, Security...
These Healthcare links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View Article“Future Looks Grim” for Healthcare Data Breaches
These Healthcare links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View ArticleNew HITECH Rules Are Here: Ready or Not?
These ISO 27001 links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View Article“New Era” for Healthcare Data Security
These Healthcare links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View ArticleOmnibus Breach Assessment Rules: 4 Steps To Compliance
The new HIPAA Omnibus Rule went into effect on March 26, 2013 — and compliance will be enforced beginning on September 23, 2013. Are you familiar yet with the new rules and how they might impact your...
View ArticleHIPAA Omnibus — What your clients are talking about
The new HIPAA Omnibus Rule, which took effect on March 26 2013, requires that law firms that come into contact with protected health information (PHI) comply with HIPAA guidance regarding its...
View ArticleCore Measure 15 Security Risk Analysis Puts Doctors at Risk
The Medicaid EHR Incentive Program (established in the American Recovery and Reinvestment Act of 2009) provides incentive payments to eligible professionals, eligible hospitals, and critical access...
View ArticleThe Risk of Information Security Risk Management
One of the “occupational hazards” of doing what I do is sleep disruption. At least once a month I’ll wake up in the early morning hours thinking about a recent conversation with a client, with a level...
View ArticleCompliance Does Not Equal Information Security—In Healthcare or Any Other...
Compliance does not equal information security. Organizations in healthcare and other regulated industries may be compliant with applicable regulations, but this does not mean they’re secure from cyber...
View ArticleWhy Personal Health Information is Worth More Off the Black Market than On It
What is the value of information? It can be hard to quantify. Organizations and society at large generally regard information as a commodity and an asset. One classic valuation of information is the...
View ArticleUsing ISO 27001 to Manage Top Cybersecurity Mistakes Health Organizations Make
1,252 publicly disclosed security breaches of healthcare and medical providers exposed over 43 million records since 2005, according to the Privacy Rights Clearinghouse. A blog post on the Managed...
View Article“Future Looks Grim” for Healthcare Data Breaches
These Healthcare links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View ArticleNew HITECH Rules Are Here: Ready or Not?
These ISO 27001 links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View Article“New Era” for Healthcare Data Security
These Healthcare links are part of a weekly series, Ethical Hacker Roundup, featuring recent information security and cyber security related articles that we’ve read over and thought worth sharing....
View ArticleOmnibus Breach Assessment Rules: 4 Steps To Compliance
The new HIPAA Omnibus Rule went into effect on March 26, 2013 — and compliance will be enforced beginning on September 23, 2013. Are you familiar yet with the new rules and how they might impact your...
View ArticleHIPAA Omnibus — What your clients are talking about
The new HIPAA Omnibus Rule, which took effect on March 26 2013, requires that law firms that come into contact with protected health information (PHI) comply with HIPAA guidance regarding its...
View ArticleCore Measure 15 Security Risk Analysis Puts Doctors at Risk
The Medicaid EHR Incentive Program (established in the American Recovery and Reinvestment Act of 2009) provides incentive payments to eligible professionals, eligible hospitals, and critical access...
View ArticleThe Risk of Information Security Risk Management
One of the “occupational hazards” of doing what I do is sleep disruption. At least once a month I’ll wake up in the early morning hours thinking about a recent conversation with a client, with a level...
View ArticleCompliance Does Not Equal Information Security—In Healthcare or Any Other...
Compliance does not equal information security. Organizations in healthcare and other regulated industries may be compliant with applicable regulations, but this does not mean they’re secure from cyber...
View ArticleWhy Personal Health Information is Worth More Off the Black Market than On It
What is the value of information? It can be hard to quantify. Organizations and society at large generally regard information as a commodity and an asset. One classic valuation of information is the...
View Article
More Pages to Explore .....