email_encryption

Email Encryption for Healthcare and Business

Email Encryption for Healthcare and Business Email encryption is a HIPAA requirement for healthcare when sending patient information over email. Email encryption is also a useful tool for law firms, financial institutions, and businesses that need to protect legal documents and personal and financial information. What is Email Encryption? Email encryption is used to convert…

Details
Ransomware Attacks Healthcare

Ransomware Attacks Targeting Healthcare

Ransomware Attacks Targeting Healthcare   Ransomware attacks against medical practices are surging in the US over the past year. Ransomware is a term used to describe malicious software designed to block access to data until a sum of money is paid. Cybercriminals use ransomware because it is highly profitable and very difficult to trace. An infected email…

Details
Vulnerability Assessment

Vulnerability Assessment & HIPAA Compliance Scans

Vulnerability Assessment and HIPAA Compliance Scans for Healthcare Vulnerability Assessment and Compliance laws aren’t something new if you’re coming from the financial or retail industry. For example, PCI Compliance was introduced in the late 90’s to help protect your personal and credit card information from criminals. Now, with the advent of the Patient Protection and…

Details
Healthcare Practice Security & Internet Defenses

Business Security and Virus Defense Strategy

Business Security and Virus Defense Strategy – Our Four Layer Defense All businesses need a security and virus defense strategy against phishing and malware. A virus, also known as malware, is a piece of software designed with malicious intent. Mild or moderate viruses can steal data and passwords, cause annoying pop-ups, or cripple your computer. In…

Details
Medicare – MACRA and MIPS

MACRA and MIPS in 2017

What are MACRA and MIPS? MACRA and MIPS, also known as The Medicare Access and CHIP Reauthorization Act of 2015, are poised to drive health care delivery and payment reform. As a result, this change affects clinicians, health systems, Medicare, and other government and commercial payers. On May 9, 2016, the US Centers for Medicare and Medicaid…

Details
ePHI security breach

Patient Data Compromised by Third Party Vendors

ePHI Security Breach at Large Healthcare Provider in Arizona In recent media coverage, Banner Health revealed that hackers might have accessed their patient health insurance records. As a result, cyber criminals compromised up to 3.7 million patient records. Unfortunately, this ePHI security breach occurred because hackers obtained access to their servers through a third party food service…

Details
stolen ePHI crippling healthcare

Stolen ePHI Crippling Healthcare Practices

Stolen ePHI Crippling Healthcare Practices Around the World In the past few days, I’ve been following a hot topic at a public technology forum focused on IT security. As an IT professional, I need to emphasize the risks of connecting unsecured devices to your network. A USB Flash Drive is a perfect example. When possible,…

Details
Overbuilt Technology Systems – Urology Practice Case Study

Overbuilt Technology Systems – A Case Study

Lowering Your Healthcare Practice’s IT Spending, lower IT spending medical practice, plus vs. VPN, custom Application, web support & maintenance for Healthcare Practices – New York, New Jersey, Pennsylvania, NY, NJ, PA, NextGen EHR Template development, Electronic Health Records, EHR Administration, IT Managed Services for Healthcare, NextGen, MAARS Automated Appointment Reminder, IT for Healthcare Practices,…

Details
Drive Encryption

Security Risk Analysis & Drive Encryption

Security Risk Analysis & Drive Encryption Lately, there’s been confusion about hard drive encryption requirements for medical practices. So, it’s important to understand the difference between “addressable” and “required” as it pertains to your Security Risk Assessment. Shortly after the dawn of the Affordable Care Act in 2010, “addressable” was a term used to describe a…

Details