Cybersecurity Attack Quick Tips For Medical Practices
Source: The information listed below is from The Department of Health and Human Services. I’m recommending you add this to your wall boards around your medical practice for all to see and use in case of a cyber attack. There are four steps HHS will be less likely to audit your practice: Step 1: Required…Read More
Encryption is not perfect, but it is required by HIPAA
Now, you don’t have to have data encryption on patient files of you don’t like keeping your hard earn money, so the choice is yours. Lost laptops, smartphones and USB drives continue to cause HIPAA data breaches. Many practices don’t realize how much patient information is on mobile devices. Patient information could be in emails,…Read More
Manuel W. Lloyd On Cybersecurity Awareness Training
Human-error; we talk about it all the time, but what exactly do we mean? Human-error occurs when an individual performs a task or does something with an unintended outcome. It’s easy to point the finger at employees as being an organization’s weakest link, but without appropriate security awareness training provided by the employer, how can…Read More
How Does the Dark Web Impact Small Businesses?
Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and sold by cybercriminals; a place known as the “Dark Web”. An article on…Read More
What is Your Personal Information Worth on the Dark Web?
The dark web is often known for the illegal activities conducted there, and while not everything on the dark web is illegal, the most appealing factor is its anonymity. The dark web is often a place where stolen data and personal information is bought and sold following a data breach or hacking incident. An article…Read More
Are viruses and ransomware created by companies that sell the cure?
Soooooo, computer bugs, viruses, adware, malware, trojans, ransomware, now maybe “cyberware”? Well, don’t you find it coincidental that these terms are also industries now? There are companies where that’s all they sell… hmmm… Could it be possible that those nasty terms and their activities were designed on purpose to build those industries and companies? I’m I…Read More
Got Cyber Insurance? You Need To, ASAP
Why? Because it’s not a matter of “if” but “when” your company has a data/security breach. Let’s take a look at some of the research: 95% of Breaches are Caused by Human Error. Source: IBM’s 2014 Cyber Security Intelligence Index But, if you think most data breaches are due to malicious insiders, you’d be wrong. Forrester…Read More
Are Cybercriminals Phishing for Your Sensitive Business Information?
With phishing attacks steadily on the rise, businesses have to be especially careful when clicking links or opening email messages from untrusted sources. The chart below shows the number of unique phishing websites detected monthly, from the last quarter of 2015 through the first quarter of 2016. [easy_chart chart_id=’6740′] Schedule a free IT security…Read More
Cybersecurity: The New Morse Code?
While sitting in one of my favorite coffee shops, someone asked me what I did for a living, so I told them. They were in their 70s and said: “I don’t understand all that cybersecurity stuff, it’s way over my head…” So I began to ask her how much she knew about things like the Pony…Read More
5 HIPAA Requirements For IT Contingency
The HIPAA Administrative Safeguards for ensuring ePHI is not only backed and can be recovered, the spirit of this CFR is to ensure ePHI is resilient. CMS calls it “Contingency Plan § 164.308(a)(7)”. The purpose of contingency planning is to establish strategies for recovering access to ePHI should the organization experience an emergency or another…Read More