Mark Twain is often credited with the line:
“Everybody talks about the weather, but nobody does anything about it.”
This spring, everyone was talking. In fact, if April is famous for its plentiful showers, then 2019 was legendary. Across the country, a number of all-time rain and snowfall totals were shattered: Asheville, NC, for example, saw 9 inches; Watertown, South Dakota was hit with 25 inches of snow – in just three days.
But it wasn’t just the ground that got soaked in April:
A veritable storm of healthcare data breaches hit the industry hard; in fact, a recent…Read more
It’s the question that’s been on everyone’s mind: how does faxing work with transmitting sensitive, medical data? (Ok, well maybe not everyone.)
For those who do rely on faxing to transmit PHI, however, the following practical points may keep you from running a foul of HIPAA compliance requirements:
- Faxing may be a traditional means of transmitting data, but it is particularly susceptible to being intercepted – unless additional safeguards are added (we’ll discuss these later). Typical telephone lines are simply not secure; in addition, mis-dialing a fax number can send your sensitive data to a completely unintended…
Since our founding in 1997, we have been providing uncompromising and affordable data security. We work with both large, enterprise-level companies and small offices and clinics providing the same, high-quality service to each. No matter how big or small, we help them keep their costs low and ensure their data is kept available, secure, and HIPAA Compliant. Because of our good work, we are listed among Clutch’s top cloud consulting services.Read more
Healthcare organizations face somewhat of a double whammy when it comes to digital security. Not only do they have to protect their businesses from evergrowing threats — including sophisticated phishing schemes, DDoS attacks, and ransomware — but they must do so in compliance with strict government regulations.
In 1996, the Health Insurance Portability and Accountability Act (HIPAA) was enacted in the U.S. by President Bill Clinton to protect sensitive patient data within the healthcare system. At the end of the Great Recession, as part of the American Recovery and Reinvestment Act of 2009 (ARRA), theRead more
Should I obtain either or both statuses?
These are common questions that should be addressed when dealing with the protection of medical data and patient records within a HIPAA Compliant hosting environment. First, the differences:
- HIPAA Compliance refers to following the proper rules in accordance with requirements and regulations set forth by policies or guidelines.
- HIPAA Certification is the process to obtain or be awarded a document or designation to attest a person has completed an educational course.
These statuses cannot be used interchangeably; they each have their own separate purposes. For example,…Read more
The clouds are gathering, so to speak. Multi-cloud technology is no longer on the horizon – it’s here.
Traditionally, healthcare organizations have been slow to embrace the benefits of the cloud, rightfully focusing on the need for essential data security. An MSSP like HIPAA Vault helps alleviate those concerns, by providing a 24/7, managed cloud environment, able to weather the storms of targeted, malicious attacks.
But the possibility of having workloads locked into “the wrong cloud provider” has always been troubling – a negative towards the goal of business flexibility….Read more
Anyone who handles medical information has probably heard the horror stories about what happens when protected data falls into the wrong hands.
There is, for instance, the $16 million settlement that health insurance giant Anthem is paying in response to the largest U.S. health data breach in history.
In that case, hackers sent spear phishing emails to an Anthem subsidiary, where at least one employee responded to a fraudulent email and opened Pandora’s box for continued attacks. An investigation later found that the data breachRead more