Ransomware Attack Affects 25,000
Ransomware attacks are cause for concern in the healthcare industry, the wealth of sensitive information, large budgets, and lack of proper safeguards, make the industry the perfect target for [...]
Ransomware attacks are cause for concern in the healthcare industry, the wealth of sensitive information, large budgets, and lack of proper safeguards, make the industry the perfect target for [...]
The Health Insurance Portability and Accountability Act (HIPAA) established several rules that covered entities (CEs) and business associates (BAs) must follow in order to be compliant. View the HIPAA [...]
Communities Connected for Kids (CCK), a Florida-based organization that provides coordination and oversight of the child-welfare system, recently discovered a hack that lasted 7 months. In March 2019, one [...]
Hackers utilizing phishing attacks disguise themselves as a trusted entity, to send their victims links with malicious content, either through email, text, or instant message. When the receiver clicks [...]
Now, do not let the title fool you. We are not trying to say that HIPAA compliance matters more for Home Health agencies. HIPAA is still a federal regulation, [...]
Cybersecurity should be at the top of the list or priorities for anyone working in the healthcare industry. Unfortunately, cyberattacks in healthcare are a growing concern. [...]
The adoption of cloud computing, especially in the healthcare industry, is widespread. Using a HIPAA cloud service allows users to access their data from multiple devices anywhere [...]
Phishing attacks can be difficult to detect by nature. Attackers disguise themselves as a trusted entity, and send their victims links with malicious content, either through email, text, or [...]
Ransomware attacks are increasingly prevalent in the healthcare community. Ransomware attacks use malicious software to gain access to a computer system, usually disabling the system, until an amount of [...]
You may ask yourself, why does Compliancy Group require Full Disk Encryption on all devices that connect to, or store ePHI? Why is it a requirement and how will [...]