Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening! My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.
3 min read
15 Lessons Learned from a HIPAA Data Breach
By Rose Doherty on 7/25/18 1:14 PM
Topics: HIPAA Compliance Data Security IT Security cybersecurity ePHI Security HIPAA Risk Analysis
4 min read
3 Reasons to Implement a Corporate Owned Device Policy
By Rose Doherty on 6/19/18 8:15 AM
The AP reported that a team-issued iPad was stolen from the car of a Chicago Bears Rookie, and the Bears Playbook was on the iPad! Fortunately, the Bears Organization had implemented a corporate owned device policy, which allowed the IT Department to take control fast.
Topics: Mobile Device Management cybersecurity corporate owned device policy byod cybersecurity plan
6 min read
8 Tips from the OCR to Prevent a Phishing Attack
By Rose Doherty on 3/14/18 1:23 PM
Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.