Healthcare Horizons: The Future of TeleMed Security
As post-pandemic life comes into view, healthcare looks to the future with telemedicine. Here’s a quick glance at expanding horizons for digital patient care & IT security.
As post-pandemic life comes into view, healthcare looks to the future with telemedicine. Here’s a quick glance at expanding horizons for digital patient care & IT security.
After a year-plus on our cyber-heels, what did we all learn? Here are 4 takeaways to strengthen security post-COVID… because the next ‘normal’ in IT Security is ours to define.
New perspectives, workarounds, and efficiencies developed throughout the pandemic are likely here to stay —and so are elevated and complex cyber threats. That’s where IT security ears need to perk up.
You’ve probably seen them used interchangeably, but distinctions between cybersecurity and IT security are important to understand to ensure accurate communication with stakeholders and vendors alike.
Starting September 1, 2018, Colorado’s new Protections For Consumers Data Privacy law will require organizations to notify victims of breaches containing personal information within 30 days of determining that a breach occurred — 30 days before current federal HIPAA requirements. Like other state laws, Colorado’s newest approved bill signals to healthcare organizations that you can no longer wait for federal mandates to suggest how you protect your patients’ information. You must prepare for potential changes now or risk suffering the consequences. Here’s what we know about the new law and how it could affect your organization. Who is Affected? First off, it’s important to note that Colorado’s law will impact not only businesses located within its borders but also entities
All it takes is one slipup to forever change the public’s outlook on your organization. This is especially true for healthcare providers. Your patients need to trust that your staff can provide them with the care they need and that your IT system won’t put their protected health information (PHI) at risk. There’s nothing like suffering a data breach to potentially lose that trust forever. HIPAA urges you to check for compliance once a year, but that simply isn’t good enough. Cyber-attacks are increasing every year. Data breaches are more prominent than ever. Cybercriminals are only growing bolder — we just recently detailed how one breach took down a major American city — for example. Ask yourself this: Are you
Cybercriminals make a lot of news by pulling off headline-grabbing data breaches. Often, this can make these attackers seem invincible, like there are no systems or good guys capable of standing up to them. This is, of course, anything but true. Cyber-attacks can be defeated and the criminals behind them can be apprehended. Today, we’re going to take a look at a recent win for the good guys. What Happened Recently, one of the key distributors of ransomware, tech support schemes and exploit kits known as “ElTest” was severely hampered by enterprising researchers. As a quick refresher, malware and ransomware are often installed on computers when users unknowingly visit infected sites. While oftentimes social engineering tactics are used to guide
Healthcare providers face a unique challenge when it comes to data protection. Cybercriminals take one look at their assets — valuable personally identifiable information (PII) like social security numbers and medical information — and throw all they’ve got at their IT security systems. If you’re not doing everything you can to maintain and strengthen your IT security, then your organization is at risk. Let’s talk. Meet us at this year’s HIMSS Annual Conference and Exhibition in Las Vegas, Nevada, to hear how BAI Security’s award-winning suite of compliance, audit and IT security solutions can help you keep even the most advanced cybercriminals at bay. HIMSS18 is set to bring together over 40,000 health IT professionals, clinicians, executives and vendors from around the world, and
With 2017 behind us and the new year beginning, there’s no time like now to reevaluate how your organization handles sensitive customer information. With data breaches increasing year after year, everyone should turn their gaze inward to ensure they are taking a proactive cybersecurity stance. Why is this so important? Here’s an example of everything that can go wrong if you don’t protect your customer’s data. Breach Fallout This year, the California Attorney General announced a $2 million settlement with Cottage Health — a healthcare network — after the organization suffered two separate breaches in 2013 and 2015, exposing the information of about 55,000 patients. Upon investigation, Cottage Health discovered that a third-party managed services provider named Insync reportedly removed
HIPPA compliance for healthcare organizations is crucial – yet many still struggle with meeting even the most basic requirements. Furthermore, merely employing a security profile that just meets regulations does not provide adequate protection. But what does it mean in real-life terms to not meet these requirements, and what steps can you take right now to improve your security? A Taller Fence Hearing phrases like, “lacking IT security” can be somewhat vague if you don’t have a firm grasp on the particulars of your network security. So here’s an example that might help: Imagine your IT security system is a fence protecting your yard. The government requires you have a fence that stands 3 feet tall. Now this might be enough
We’re here to discuss your upcoming IT security assessment and compliance audit needs.