Health Data Security Compromised by Third-party Apps

A new report published by Approov uncovered major cybersecurity flaws in third-party health apps that populate patient data from electronic health record systems. Through research conducted by cybersecurity analyst Alissa Knight, it was found that the health data security of many of these apps are flawed, putting the patients that use them at risk. Report Uncovers Major Vulnerabilities The Fast Healthcare Interoperability [...]

2022-05-06T17:03:52-04:00October 20th, 2021|

7 Healthcare Cybersecurity Facts You Need to Know

Cybersecurity should be at the forefront of any business’ mind, and this is especially true when it comes to healthcare organizations. Healthcare organizations have become the primary target for hackers due to the wealth of information they hold on patients. Read the healthcare cybersecurity facts you need to know below. Healthcare Cybersecurity Facts Human error causes the majority of breaches Implementing an [...]

2022-05-06T14:38:09-04:00September 21st, 2021|

New Healthcare Cybersecurity Threats Reported

As hackers become more sophisticated, it is important to keep up to date with new threats. There are two new threats that are concerning in that they are difficult to recognize and detect. One of these threats is a very convincing phishing scam, while the other is a malicious encryption scheme that evades ransomware detection software. Although these are not necessarily healthcare cybersecurity threats, they target businesses across [...]

2022-05-06T14:38:09-04:00September 3rd, 2021|

Why You Need Dental IT Support

Dental office administrative staff are often overburdened with a multitude of tasks, especially as of late with staffing shortages across the country. These staff members are often required to wear many hats and are therefore more likely to fall victim to burnout. With their focus divided across several tasks, it is difficult to fully address the security needs of the modern dental practice. This is where dental IT [...]

2022-07-25T09:44:43-04:00September 1st, 2021|

How to Prevent Phishing Attacks in Healthcare

Malware and ransomware attacks have become more prevalent in recent times across all industries and market sectors. Large-scale attacks such as the ones perpetrated on Colonial Pipeline and JBS Foods were widely covered by the media. But these are not the only examples of successfully conducted attacks on businesses of all types and sizes. The healthcare industry presents attractive targets for hackers [...]

2022-05-06T14:43:58-04:00August 20th, 2021|

ePHI Security Emphasized in HHS Summer Newsletter

Although the HHS has long stressed the importance of ePHI security, with the influx of healthcare breaches, it is clear that many organizations have not heeded the warning. With an increase in breaches across all industries, cybersecurity has become the focus of many government agencies including the HHS. Earlier this month the HHS published its “Summer 2021 Cybersecurity Newsletter” further emphasizing the importance of information access [...]

2022-05-06T14:38:10-04:00July 30th, 2021|

Is ProtonMail HIPAA Compliant?

ProtonMail is an email encryption service that is designed with businesses in mind, enabling users to send and receive secure emails. But when you work with protected health information, you must consider more than a software’s security, you must also look at whether or not it is HIPAA compliant. Is ProtonMail HIPAA compliant? Find out by reading below. ProtonMail HIPAA Compliant Email Encryption [...]

2022-07-12T11:33:23-04:00July 16th, 2021|

4 Tips for HIPAA Compliant Mobile Devices

Many people use their mobile devices for business purposes, but it is important to consider the security implications of doing so. This is especially the case with healthcare organizations, as using their mobile devices improperly can lead to HIPAA violations. With so much to consider, tips for HIPAA compliant mobile devices are discussed below. What Does NIST Say About Mobile Device Security? Although mobile device security is not [...]

2022-05-06T13:55:30-04:00June 18th, 2021|

4 Remote Working Security Tips: Protecting Patient Privacy in a Remote World

Although many businesses have returned to regular operations, there is still a large portion of workers that continue to work remotely, or work on a hybrid schedule. It seems as though this may continue for sometime, and for some companies, indefinitely. There can be a host of cybersecurity issues when staff members access company information while working remotely. So, how can you protect patient privacy in a remote [...]

2022-05-06T14:38:11-04:00June 8th, 2021|

Is Carbonite HIPAA Compliant?

Is Carbonite HIPAA compliant? Carbonite is a software solution provider that offers data backup solutions, disaster recovery services, and endpoint protection. These are all security measures that must be implemented by covered entities and business associates to comply with HIPAA. But, does Carbonite offer a HIPAA compliant service? Find out below.  What Are HIPAA Required Data Backup and Disaster Recovery Plans? Carbonite offers both data backup and disaster [...]

2022-05-06T12:25:54-04:00May 27th, 2021|