Blog

Blog > Page 31

Blog

HIPAA Security Reminder of the Week

Identify the Risk Groups and Safeguard PHI Sensitive information, such as PHI and PII, is a critical asset within a health care organization. Identifying the risk groups helps clarify operational context and reveals potential vulnerabilities across the IT infrastructure. By doing this, we establish clear priorities for making security investments [...]

Read More

HIPAA Security Reminder of the Week

HIPAA Alphabet Soup The Acts that made all this privacy and security possible: HIPAA: Health Insurance Portability and Accountability Act HITECH Act: Health Information Technology for Economic and Clinical Health Act ARRA Act: American Recovery and Reinvestment Act Key acronyms: BA: Business Associate CE: Covered Entity EHR: Electronic Health Record, [...]

Read More

Backup and DR: Keep your business safe

It’s essential to have the right IT backup and disaster recovery (DR) systems in place if you want to safeguard your company’s digital assets. From cyberattacks and malware to hardware failures and natural catastrophes, having the right plan in place is essential. It can test your system, prevent loss and [...]

Read More

HIPAA Security Reminder of the Week

Unique User Identification – Logon ID The HIPAA Security Rule requires Covered Entities and Business Associates to implement a “Unique User Identification” for systems holding Electronic Protected Health Information (ePHI). It is a “required” implementation specification under the Access Control Standard and should be employed for all information assets that [...]

Read More

The best games for kids to play at school

The value of game-play as an educational technique is now well established. More and more games and platforms are being released each year that help students learn valuable skills while they play; so, which subjects benefit most from this technique and what skills do they teach? With educational benchmarks and [...]

Read More

HIPAA Security Reminder of the Week

Potential HIPAA Security Violations When an unencrypted device containing ePHI is stolen or missing, this could result in a HIPAA security violation. For example: A thumb drive containing the Electronic Protected Health Information (ePHI) of approximately 2,200 individuals was stolen from a vehicle. The entity needed to conduct an accurate [...]

Read More

How to pick the right health software

With aging populations, advances in medical technology and the growing importance of ‘e-health’, software vendors are focusing more attention than ever on the health market. But with so many newcomers, how can you know you’re choosing the right software provider? Healthcare is a buoyant industry, with many opportunities for growth [...]

Read More
Call Now Button