Blog
-

Can I Have Patient Communication on My Website?
Patients don’t want to be put on hold. They’re tired of accommodating to constraining office hours. Consequently, they’re looking for easy ways to communicate with…
-

My EMR/EHR Makes Me HIPAA Compliant, Right?
Far too many privacy officers lean on their electronic medical record (EMR) or electronic health record (EHR) system as a HIPAA compliance crutch. They believe…
-

Is Your Backup Data Secured?
In January 2017, a HIPAA-covered Texas clinic learned that someone had stolen an unencrypted external hard drive. The thief took it from a locked closet…
-

What Are Audit Trails, and Why Are They Important?
If you don’t record and review system activity, hackers or unethical employees can harm your organization without a trace. Therefore, The Office for Civil Rights…
-

What is a HIPAA Security Risk Analysis?
A security risk analysis is a vital part of the risk management process. According to the HIPAA Security Rule, all HIPAA-covered organizations must conduct them.…
-

Update on Texting Patient Orders
The Joint Commission (TJC) has concluded that it is not acceptable to use secure text messaging for patient care orders. Industry experts weighed in on…
-

What Are TPO Disclosures?
There are serious consequences to impermissibly disclosing patients’ protected health information (PHI). This is a paralyzing prospect to many healthcare employees. Consequently, some staff members…
-

Risky Business: Should You Keep Documents in Storage Units?
Document management and storage is a universal business concern. This issue is even greater for healthcare organizations. As a HIPAA-covered organization, you must keep both…
-

Social Engineering: A Hacking Story
We’re all familiar with what a technical hacker is. They sit behind a computer somewhere planning their strike on an unsuspecting healthcare company. Healthcare is…
-

5 Easy Steps to Enhance Cybersecurity
Hacking incidents – and the number of records exposed by hackers – are on the rise. The healthcare industry is a prime target for cybercriminals.…