Are Search Engines Compromising PHI Security?

It was recently discovered that advancements in search engine capability may pose a risk to PHI security. Researchers from American College of Radiology (ACR), Radiological Society of North America (RSNA), and Society for Imaging Informatics in Medicine (SIIM) warned healthcare professionals and radiologists of the risk of using medical images for educational purposes. How Can Search Engines Identify Medical Images Optical Character [...]

2020-09-08T10:11:45-04:00September 8th, 2020|

3.1 Million Patients Exposed by Unsecure Healthcare Database

Recently, security researcher, Volodymyr Diachenko, discovered a healthcare database left available for public view. The healthcare database, containing the protected health information (PHI) of 3.1 million patients, was easily accessible, requiring no password to access the information. What Happened Following the Discovery? Upon discovery of the exposed healthcare database, Diachenko did some research to uncover who owned the database. He found that the healthcare database belonged to a [...]

2020-08-20T14:15:02-04:00August 20th, 2020|

Large-Scale HIPAA Security Breach: Improper Use of GitHub

Recently, the improper use of GitHub led to a large-scale HIPAA security breach, leaving the protected health information (PHI) of 150,000 - 200,000 patients available through publicly searchable employee login credentials for nine healthcare organizations. Software developers use GitHub for source code management and version control when creating, or making changes to, software. One feature of GitHub is the ability to use [...]

2020-09-04T21:14:43-04:00August 18th, 2020|

One Breach Led to Another: Independence Blue Cross Breach

In 2018, the MyFitnessPal app was hacked, affecting 150 million users. The hack exposed the login credentials for app users; a year later, it was discovered that the stolen credentials were being sold on the dark web. Recently, that breach led to another, the Independence Blue Cross breach.  Is your organization secure? Find out now with our HIPAA compliance checklist. Independence Blue Cross Breach: What Happened On May 8, [...]

2020-07-20T19:56:17-04:00July 13th, 2020|

Is Zendesk HIPAA Compliant?

Zendesk offers support, sales, and customer engagement software. Healthcare providers can use the Zendesk Support Suite to provide virtual patient care via phone, chat, email, text, and mobile. Is Zendesk HIPAA Compliant? For Zendesk to be HIPAA compliant, it must offer security controls that can be configured to meet the HIPAA Security Rule requirements. Zendesk must also be willing to enter into a business associate agreement with providers. Is [...]

2020-07-07T09:57:03-04:00July 7th, 2020|

Exposure Notification Privacy Act Aims to Regulate Contact Tracing Apps

Recently, a bipartisan group of United States Senators introduced the Exposure Notification Privacy Act (ENPA). This bill aims to regulate exposure notification and contact tracing apps that will be used to monitor and control COVID-19 spread. What is Contact Tracing? Contact tracing is the process of identifying people who may have come into contact with a person infected by a virus. COVID-19 contact tracing apps are being developed by [...]

2020-09-14T17:01:54-04:00June 9th, 2020|

Telehealth Security: Using a VPN

There has been much debate on whether or not telehealth offers a secure means of communicating with patients, especially with many providers seeing patients virtually from their home offices. This has left many to wonder if using their home WiFi poses a security risk. Although there are security implications when using a personal WiFi for business use, connecting to a virtual private network (VPN) provides an easy solution to [...]

2020-06-16T13:34:46-04:00June 1st, 2020|

National Security Agency Issues Cybersecurity Guidance for Teleworkers

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence. Recently, the NSA issued cybersecurity guidance for teleworkers to help improve security for remote work. The cybersecurity guidance is relevant to healthcare workers who provide telehealth services from their home computers and smartphones. Is your organization secure? Download the free cybersecurity eBook to [...]

2020-05-26T13:38:06-04:00May 6th, 2020|

A String of Healthcare Ransomware Attacks Affect Thousands

Several healthcare ransomware attacks have occurred over the past few months. Healthcare ransomware attacks occur when hackers access a healthcare organization’s patient data, demanding a sum of money for its return. The malicious encrypting of files leaves many organizations crippled in the months following an attack. Healthcare Ransomware Attacks: Parkview Medical Center April 21, 2020, Parkview Medical Center suffered a ransomware attack, targeting their electronic medical record (EMR) system. [...]

2020-05-05T12:45:34-04:00May 5th, 2020|

Replace HIPAA With New Federal Privacy Laws? ITIF Says Yes

The Information Technology and Innovation Fund (ITIF), a prominent independent, nonpartisan think tank, has recommended a repeal of a number of U.S. privacy regulations, including HIPAA. ITIF has recommended that HIPAA, which it views as part of an ineffective patchwork of U.S. privacy regulations, should be replaced with new federal privacy laws. What New Federal Privacy Laws Does ITIF Recommend? ITIF has called for a series of changes to [...]

2020-05-07T09:32:38-04:00May 4th, 2020|
Load More Posts