Consolidated Appropriations Act 2022 – What’s In It?
In March of 2022, President Biden signed into law the Consolidated Appropriations Act 2022. The Consolidated Appropriations Act 2022 wears many hats. The law reauthorizes the Anti-Violence [...]
In March of 2022, President Biden signed into law the Consolidated Appropriations Act 2022. The Consolidated Appropriations Act 2022 wears many hats. The law reauthorizes the Anti-Violence [...]
In April of 2022, the Department of Health and Human Services (HHS)’ Office of Information Security issued a 27-page publication, entitled “Insider Threats in Healthcare.” The publication [...]
In January of 2021, HR 7898, nicknamed the Cybersecurity Best Practices bill, was signed into law. Under this law, the Department of Health and Human Services (HHS) [...]
Each quarter the Department of Health and Human Services’ Office for Civil Rights issues a cybersecurity newsletter. The newsletter highlights cybersecurity trends affecting the healthcare industry. As [...]
As 2022 unfolds, the security and compliance threats to organizations and healthcare practices look a lot like a repeat of 2021: more ransomware threats, recycling old scams [...]
As technology makes our lives easier, it brings the challenge of remembering all the various usernames and passwords required to access our data. Many of us take [...]
The Department of Health and Human Services has launched a new website designed to align HHS cybersecurity guidance across the healthcare spectrum and facilitate the exchange of best practices [...]
Most security experts agree that it is no longer a question of if cybercriminals will target your practice, but when. Hacking, phishing attacks, and ransomware can effectively [...]
Nearly Half of Healthcare Orgs Have No HIPAA Incident Response Plan for Cyberattacks Despite the growing threat of cyberattacks such as phishing, hacking, [...]
A cybersecurity flaw responsible for widespread disruptions of applications and web services has the potential to adversely affect medical device security around the world. How the Log4j Hacks Threaten [...]