Cyber Security

Cyber Security

Weekly Security Tip: What is Social Engineering?

Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered. In this week’s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for. Quick Tips Watch out for threatening language during phone calls and emails. Offeri...

what is ransomware?

Deep dive into Ransomware and how to prevent it

High in the list of system managers’ nightmares is a message on the screen saying, “Your files on this computer have been encrypted. Please send us payment if you want to get them back.” That means the computer has been attacked by ransomware. Government institutions, hospitals, and large enterprises have fallen victim to it. The costs can be huge, whether you pay the amount dema...

fitbit-charge-3-review-xxl-2560x9999

Is FitBit HIPAA Compliant?

Are wearables HIPAA compliant? Your FitBit is in a gray area of compliance and with technology on the rise, providers and HIPAA regulations will need to stay up to date to accommodate the new ways of processing health data. Read more about this story.

OCR’s long list of fines

#OCR has given out $80 million in fines in 55 cases since the HIPAA ruling took effect in 2003. Read more below about the hashtag#HIPAA violation cases the OCR has dealt with below. Read this article

Girl Scouts of Orange County averted the breach of 2,800 girls information

Is your daughter a part of the #GirlScouts? Be careful, even the Thin Mints are at risk of a #breach. Read the article about how the Girl Scouts of Orange County averted the breach of 2,800 girls information through an email hack.

Do you need to comply with HIPAA?

Why do you, as a doctor, dentist or any other medical provider, need to comply with HIPAA?   Listen to my podcast! SoundCloud: Link: https://soundcloud.com/middayreferralnetwork/getting-your-practice-hippa-compliant Even though HIPAA may seem complicated, we have the solution. Our newest offering gives you an all-in-one web-based platform to address your HIPAA comp...

image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg

What constitutes a HIPAA breach?

A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of the information. HIPAA violations can have very serious consequences ranging from $100 – $50,000 per incident up to $1.5 Million. The best way to prevent a breach is to always keep PHI confidential and follow proper security practices. Some examples of breaches ...

img_20190611_155207_2528543152298134026353.jpg

Cyber Security tips while traveling

Cyber Security is not just for when you are in the office or at home. Sorry, but you are not excluded when you travel. If you have plans on traveling this summer or travel frequently follow these simple but important steps and stay safe: 1. Backup up your data on all devices(your mobile device, laptop, or tablet) before you leave. 2. Backup to the cloud(Google, iCloud, etc) frequently while away. ...

cyber security

What to do if you have Ransomware

Do you or your employees know what to do if your infected with a #virus or have #ransomware? If you suspect yourcomputer is infected: 1. Immediately disconnect the equipment from the Network/Internet. Unplug the network cable or disable wireless. 2. Leave the equipment on; don’t close or open new programs. 3. Write down any messages that appear on the monitor. 4. Note all events that occurred befo...

HIPAA

Do you need to comply with HIPAA?

So, What Is HIPAA? HIPAA, Health Insurance Portability and Accountability Act, established in 1996, sets down rules intended to ensure that organizations with access to patients health information are protecting that highly confidential information appropriately. The Office of Civil Rights (OCR) levies penalties on medical offices for non-compliance which could go to up to $1.5 million per violati...