BLOGS
EASY SUBSCRIBE


Patient Privacy

Interoperability and EHR Optimization

Report Writing

The Risks and Rewards of Telehealth in Today’s Climate

U.S. public health officials, hospitals, and insurance companies are urging people to try telemedicine to prevent having to leave their homes and to therefore curb the spread of COVID-19, and people are listening. Once skeptical, patients are jumping on board so they can be evaluated in a safer setting – their home. Healthcare organizations are also reassessing staffing and shifting a large portion of hospitals to teleworking.

Read More

3 Tips to Help Keep Business on Track in Light of the Coronavirus

The rising concern of COVID-19 has shaken everyone, and we’ve already seen the impact it has had on our grocery supplies, tradeshows and events, daily outings, and really, how businesses are conducting daily business. We recognize that this situation has impacted many people in numerous ways, and that’s why we’d like to offer a few tips to help you work in this environment and keep business moving.

Read More

3 Tips for a Successful HIMSS20

We’re weeks away from the 2020 HIMSS Global Health Conference and Exhibition on March 9-13. But before you hop into a plane or car and head to Orlando, we suggest you review these tips to ensure a successful HIMSS20.

Read More

Cyber Security Risk Management 101

According to the Fortified Health Security 2020 report, the healthcare industry is expected to experience a 10-15 percent increase in the number of entities breached in 2020, with providers being the most targeted and exploited segment.

Read More

Taking Inventory of Your Privacy & Security Programs

One of the foundations of an effective Privacy and Security program is always accountability. Accountability of assets. Accountability of personnel. Accountability of permissions, agreements, and regulations. We must know the scope. Therefore, it is important to routinely take inventory of any relevant elements in your program.

Read More

Top 5 Privacy & Security Resources of 2019

It’s that time of year to reflect on 2019. While we were doing our annual analytics check, we realized the majority of our readers were most interested in our privacy and security-related blogs. To be honest, we weren’t surprised – smart healthcare organizations always keep privacy and security top of mind. We wanted to make it easy by giving you some of our best privacy and security resources from 2019, so you can feel confident going into 2020.

Read More

Cybersecurity Awareness Month Recap

We just wrapped up the month of October supporting National Cybersecurity Awareness Month and the emphasis focused on the mantras of Own IT, Secure IT, Protect IT as it relates to your personal and patient data. As a leader in Patient Privacy, we were proud to participate in National Cybersecurity Awareness month, and share many educational resources throughout the month. Each week during the month we focused on a different topic to give you tips for what hospital leaders (and in some cases, you personally) can do to improve cybersecurity protection.

Read More

Cybersecurity Awareness: The Layers of Patient Privacy

As part of Cybersecurity Awareness Month, we've shared tips so far for "Owning It" with remote access security, "Securing It" with multi-factor authentication, and "Protecting It" against Phishing attacks, and the potential costs of a HIPAA violation. Today I want to talk about how having layers of patient privacy help keep Protected Health Information (PHI) safe. 

Read More

Cybersecurity Awareness: What You Need to Know About Phishing Attacks

As you may be aware, October is National Cybersecurity Awareness Month and the emphasis focuses on the mantras of Own IT, Secure IT, Protect IT. In previous weeks, we've focused on "Own IT" as it relates for Remote Access Security, "Secure IT" as it relates to multi-factor authentication, and "Protect It" as it relates to HIPAA violations. This week, I want to focus again on "Protect It" and how it relates to protecting data from scammers or hackers.

Read More

Cybersecurity Awareness: The Cost of Violating HIPAA

In support of Cybersecurity Awareness Month, we've shared tips so far for "Owning It" with remote access security, "Securing It" with multi-factor authentication, and today I want to talk about "Protecting It" and the potential costs of a HIPAA violation if you aren't able to protect it (with "it" being PHI).

Read More

Comments

0 COMMENTS