Remove how-to-protect-your-business-from-an-email-breach
article thumbnail

How to Protect Your Business From an Email Breach

Electronic Health Reporter

Physician-staffing firm, EmCare, became the latest of several victims within the healthcare industry of an email phishing scam, as an unidentified hacker recently gained access to the accounts of multiple EmCare employees. The article How to Protect Your Business From an Email Breach appeared first on electronichealthreporter.com.

89
article thumbnail

Reactions to the Ascension Healthcare Ransomware Attack and Suggestions for Healthcare Organizations

Healthcare IT Today

I remember after the devestation of Hurricane Katrina, we all woke up to the need for better disaster recovery and business continuity. We reached out to our network of security experts to get their opinions and perpsectives on the Ascension ransomware attack and what healthcare should learn from it.

EHR 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Ever Evolving World of Cybersecurity Threats

Healthcare IT Today

The amount of technology used and how it is being used has skyrocketed and unfortunately, alongside it so has the amount and sophistication of cybersecurity threats. The following is what they say are the biggest ongoing threats to watch out for in your organization. How did it start? And the world of healthcare is no different.

article thumbnail

October Is For Cybersecurity Awareness Month: Essential HIPAA Security Risk Assessment

Telebehavioral Health Institute

With October being “Cybersecurity Awareness Month,” security education and planning should be at the top of the list for many healthcare businesses. . The HHS list of healthcare cybersecurity best practices include: Email protection systems : measures put in place to secure email communications.

HIPAA 52
article thumbnail

BetterHelp Investigation by FTC & Privacy Update by DOJ

Telebehavioral Health Institute

FTC BetterHelp Investigation A January study by MarkUp and Stat showed how the top 50 telehealth startups routinely share sensitive patient information with marketing companies for profit. Institute policies, practices, and procedures to protect health information. It specified six clear takeaways for healthcare companies. .

article thumbnail

The Importance of Healthcare Cybersecurity: Best Practices for Protecting Patient Data and Ensuring HIPAA Compliance

DrKumo Remote Patient Monitoring

According to the HIPAA Journal , between 2009 and 2021, the Department of Health and Human Services’ Office for Civil Rights received reports of 4,419 healthcare data breaches of 500 or more records each. These breaches resulted in the loss, theft, exposure, or unauthorized disclosure of a total of 314,063,186 healthcare records.

article thumbnail

HIPAA Compliance Checklist: How to Protect Patient Data

DrKumo Remote Patient Monitoring

This guide provides information on how to create a comprehensive checklist and tips for successfully implementing it at your practice. Creating a HIPAA compliance checklist involves ensuring proper safeguards for protecting confidential medical records and other protected health information (PHI).

HIPAA 40