HIPAA NEWS & ARTICLES

HIPAA RSS NEWS
HIPAA ARTICLES
  • {{feed.title}}

    ★ Link:  {{feed.link}}

    ★ Author:  {{feed.author}}

    ★ Content:  {{feed.contentSnippet}}

  • Ransomware on the Rise

    Created Department of Justice (FBI) - March 2016

    The FBI provides guidance as it sees a recent rise in ransomware - Listen to Podcasts and Radios.

    PodCast
    Beware the Rise of Ransomware

    Created Content created by Kim Boatman - March 2016

    The FBI recently issued an alert about the broader category of rogueware, which include ransomware and fake antivirus scareware scams. According to the FBI, criminals are netting an estimated $150 million a year through these scams.

    Full Story
    OCR Launches Phase 2 of HIPAA Audit Program

    Created Content created by Office for Civil Rights (OCR) - March 2016

    As a part of its continued efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the HHS Office for Civil Rights (OCR) has begun its next phase of audits of covered entities and their business associates. Audits are an important compliance tool for OCR that supplements OCR’s other enforcement tools, such as complaint investigations and compliance reviews. These tools enable OCR to identify best practices and proactively uncover and address risks and vulnerabilities to protected health information (PHI).

    Full Story
    Think you're not subject to HIPAA? You might want to think again!

    While it is true that HIPAA applies to most health care providers, HIPAA’s applicability is far more widespread

    By Kerry Moskol, Jennifer Hessessy - Jan 7, 2015

    Do you think of HIPAA as a law that applies only to health care providers? If so, the good news is that you’re not alone. The bad news is that you may have some work to do.

    Full Story
    Hackers are coming after your medical records

    By Cadie Thompson - Thursday, 29 May 2014

    Forget your credit card data. The smartest hackers are now targeting your medical records. Cybercriminals are now going after health-care sites more than they are retailers, financial institutions and utility companies, according to a study published Wednesday by the security firm BitSight Technologies.

    Full Story
    The ICIT RANSOMWARE REPORT 2016

    By James Scott & Drew Spaniel, 2016

    2016 is the year ransomware will wreak havoc on America’s critical infrastructure community. Click on the link to download a comprehensive report.

    Full Story

    Generic placeholder image

    STEP1: LOCAL SCAN & REMOTE MACHINE DISCOVERY

    Upon running the application, the tool automatically perform an initial but full scan on the local machine and perform Asset Discovery on all remote machines.

    Generic placeholder image

    STEP2: USER SELECTED MACHINES FOR FULL REMOTE SCANNING

    If the user decided to scan one or more (or all) networked or remote machines, the tool will scan each selected remote machine sequentially against a full set of HIPAA IT security requirements.

    Generic placeholder image

    STEP3: GENERATE HIPAA IT SECURITY COMPLIANCE REPORTS

    Upon completion of any scan (local and/or remote), the tool generates three (3) technical documents or compliance reports associated with the HIPAA IT security requirements automatically.