Telehealth Security: Using a VPN
There has been much debate on whether or not telehealth offers a secure means of communicating with patients, especially with many providers seeing patients virtually from [...]
There has been much debate on whether or not telehealth offers a secure means of communicating with patients, especially with many providers seeing patients virtually from [...]
The Hawaiian language has a memorable equivalent of the English word for “fast”: “wikiwiki.” The term “wikiwiki” can be spoken quickly. Similarly, when a person looks up a “wiki” [...]
Recently, many organizations have begun to wonder if a risk assessment is mandatory. This in part is due to misinformation on some websites that claim that a HIPAA mandatory [...]
Under the HIPAA Security Rule, covered entities and business associates are required to implement appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security [...]
Integris researchers conducted a survey in which they asked healthcare leadership to assess their data privacy maturity. They surveyed 258 executives from mid to large organizations, and found that [...]
Artificial Intelligence (AI) is increasingly utilized across a variety of industries as it streamlines and improves business processes. AI can also facilitate the quick detection of data breaches. Currently [...]
The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA related transaction) and [...]
A managed service provider (MSP) is an entity that remotely manages a covered entity’s IT infrastructure, and/or end-user systems. Managed service providers who work with clients [...]
The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA [...]
Healthcare entities require a means to easily share protected health information (PHI). When sending PHI it is imperative to keep HIPAA requirements in mind. The Health [...]