How Much Can HIPAA Violation Fines Cost Your Business?

How Much Can HIPAA Violation Fines Cost Your Business?

  The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires covered entities and business associates to keep electronic protected health information (ePHI) secure. Any violations of HIPAA regulations are subject to financial penalties and/or corrective action plans enforced by the Health and Human Services' Office of Civil Rights.

What should you expect from a HIPAA security risk assessment?

What should you expect from a HIPAA security risk assessment?

A HIPAA security risk assessment is an essential component of achieving and maintaining full compliance with the federal law. Every covered entity and business associate should conduct periodic risk assessments, including whenever they make significant changes to operational or technology infrastructure.

Why you can’t afford to make a mistake when performing a HIPAA risk assessment

Why you can’t afford to make a mistake when performing a HIPAA risk assessment

Healthcare is a favorite target of cybercriminals due to the high value of personally identifiable information on the black market. One of the main tenets of the HIPAA security rule is that covered entities and business associates must carry out periodic HIPAA risk assessments to determine where lie their vulnerabilities and the threats that face them. Even though HIPAA IT security requirements ...

What is a HIPAA security risk assessment, and who needs one?

What is a HIPAA security risk assessment, and who needs one?

The healthcare sector is one of the favorite targets for cybercriminals and state-sponsored hackers. Contrary to popular belief, things like stolen medical records are worth far more on the black market than payment cards. That’s why it’s essential to take every reasonable step to protect patient health information (PHI), both for the sake of your organization and your patients or clients. ...

Achieving HIPAA IT Compliance: Begin Preparing for Success Now

Achieving HIPAA IT Compliance: Begin Preparing for Success Now

Advancements in technology have made it easier for cybercriminals and insider threats to steal, leak, and misuse electronic personal health information (ePHI). If your organization handles ePHI or works with other companies in the healthcare industry, it's vital that you comply with the regulations of the Health Insurance Portability and Accountability Act (HIPAA).

IT Items That Should Be on Every HIPAA Compliance Checklist

IT Items That Should Be on Every HIPAA Compliance Checklist

The COVID-19 pandemic ravaged the healthcare industry in 2020, and cybercriminals were quick to take advantage of the dire circumstances to launch cyberattacks on healthcare organizations to steal electronic protected health information (ePHI). According to Check Point Software, global attacks on the healthcare sector increased by 45% in 2020.

What Is HIPAA Compliance? 5 Common Mistakes IT Companies Make

What Is HIPAA Compliance? 5 Common Mistakes IT Companies Make

The Health Insurance Portability and Accountability Act (HIPAA) was formed to standardize the ways patient health information (PHI) is protected. Healthcare providers and their IT partners, whether in-house or outsourced, should be knowledgeable about the key provisions of HIPAA. But that’s rarely the case for many healthcare organizations.

7 things you need to know about the HIPAA compliance certification

7 things you need to know about the HIPAA compliance certification

Privacy is a fundamental human right, especially when it comes to sensitive information, such as patient health records. As digital transformation continues to drive change throughout the healthcare sector, there’s a clearer and greater need than ever for organizations to pay close attention to information security, privacy, and confidentiality. That’s where the health insurance portability and ...

4 of the easiest security gaps to correct for SOC 2 compliance

4 of the easiest security gaps to correct for SOC 2 compliance

Faced with the constantly evolving cyberthreat landscape, businesses must do everything in their power to avoid getting breached. The standards are growing stricter as the threats grow ever more sophisticated and varied in nature. Clients of services companies are increasingly wary about who they do business with, not least because many attacks happen somewhere along the supply chain.

How to get SOC 2 compliance: why SIEM is a game changer

How to get SOC 2 compliance: why SIEM is a game changer

While today’s business leaders generally understand how important it is to implement multiple layers of security over their customer data, they can’t protect what they don’t know about. This is why it’s essential to have a complete and current view of their entire IT infrastructure. That’s the first step towards achieving compliance with any information security regulation, and SOC 2 is no ...