2 min read
What are strong security practices?
Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are especially useful for email account security.
Read More2 min read
Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are especially useful for email account security.
Read More2 min read
Prior authorization (PA) is a process where healthcare providers must obtain approval from insurers before delivering specific treatments or...
2 min read
Over the past two years, healthcare employees have faced increased threats and assaults, further compounded by the stress and resource constraints of...
2 min read
The CISA, NSA, and FBI along with international partners, released guidance in response to recent cyber espionage by PRC-affiliated threat actors.
1 min read
The FDA has introduced recommendations for managing the continuous updates of AI-enabled medical devices. The approach includes a plan outlining how...
2 min read
According to the HHS Security Series on Risk Analysis and Management, “The required implementation specification at § 164.308(a)(1)(ii)(A), for Risk...
3 min read
Risk analysis includes identifying where ePHI is created, received, maintained, or transmitted. Organizations can discover potential risks to their...
1 min read
Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...
2 min read
Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...
1 min read
Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.
3 min read
While organizations have flexibility in structuring their compliance functions, having dedicated HIPAA compliance staff can help ensure ongoing...
2 min read
Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...
2 min read
Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...