HIPAA public
[search 0]
Mai Mult
Download the App!
show episodes
 
Artwork

1
Help Me With HIPAA

Donna Grindle and David Sims

Unsubscribe
Unsubscribe
Săptămânal
 
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
  continue reading
 
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
  continue reading
 
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
Loading …
show series
 
Doing a half-baked risk analysis is like locking your front door but leaving all the windows wide open. What’s the point? Today, we dive into the first-ever Security Risk Assessment (SRA) violation settlement—a juicy topic for compliance nerds and healthcare pros alike. We’re talking ransomware, compliance checklists (the kind you actually need), a…
  continue reading
 
Healthcare organizations face growing pressure to strengthen security measures, as highlighted in the recent HHS and NIST conference. What does this mean for your organization, and what steps should you take now? Get the latest insights and practical tips in the newest Medcurity Podcast. Learn more about Medcurity here: https://medcurity.com #Healt…
  continue reading
 
Buckle up for Part 2 of our breakdown on the HHS OCR NIST healthcare security conference - because, yes, 16 hours of deep dives into AI, HIPAA compliance, and cybersecurity priorities can’t be tackled in just one episode! From wild projections about AI’s future in healthcare to OCR’s “tough love” on compliance standards, this episode peels back the…
  continue reading
 
With the end of the year approaching, now’s the time to take a close look at any potential vulnerabilities within your organization. An annual Security Risk Analysis demonstrates your commitment to data and system protection, while also reassuring customers and meeting compliance standards. Tune in to the latest episode of The Medcurity Podcast to …
  continue reading
 
Buckle up, folks! Today, Donna and David are here with Part 1 of their deep dive into the recent HHS OCR NIST healthcare security virtual conference, and they're spilling all the cyber-tea. With experts from HHS, OCR, NIST, FTC, and FDA presenting, this conference covered a ton. From AI-powered hackers and QR code scams to unpatched medical devices…
  continue reading
 
Securing your vendor relationships is necessary for protecting patient data under HIPAA. Third-party services can introduce vulnerabilities into your system. In this episode, we’ll show you how to close those gaps. Ready to safeguard your network and secure patient trust? Hit play and let’s get started. Learn more about Medcurity here: https://medc…
  continue reading
 
Ever heard someone say you need a pen test but then start wondering if they meant a pen from a spy movie? There typically is a lot of confusion between penetration testing and vulnerability assessments—a common mix-up with big consequences for your cybersecurity game. We will walk through different types of pen tests, explain how they help you spot…
  continue reading
 
For Cybersecurity Awareness Month, we’re focusing on tactics commonly used by hackers today. Train your staff on phishing, quishing, vishing, and more to stay safe in today’s digital world. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA
  continue reading
 
Ever had a root canal that felt less painful than dealing with bureaucracy? Well, buckle up, because in this episode, we sink our teeth into the 50th patient right of access enforcement action under HIPAA. That’s right—50 cases since 2019, and somehow, this one involving Dr. Gumb (yes, really) and a dental records dispute is the most absurd of the …
  continue reading
 
Today we tackle the trifecta of cybersecurity headaches: Microsoft’s awkwardly ambitious recall feature, the looming HISAA regulations (because HIPAA wasn’t enough), and a juicy enforcement action following a ransomware attack. We’ll break down how Microsoft’s recall reboot went from intrusive default to opt-in relief, why HISAA could mean mandator…
  continue reading
 
Your organization’s biggest risk may come from within. In this episode, we discuss how insider breaches—whether malicious or accidental—can be just as devastating as external attacks, because insiders already have access to critical systems. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA…
  continue reading
 
Leaving your web browser open with 25 tabs is the digital version of leaving your front door unlocked? Whether it's for email, work docs, shopping, or watching cat videos, your browser is the gateway to, well, everything. But as much as we depend on them, so do hackers. From credential theft to sneaky phishing attacks, cybercriminals are finding cl…
  continue reading
 
What is Zero Trust in cybersecurity? For this Cybersecurity Awareness Month, we’ll be going over several key elements of a good cybersecurity strategy, and today’s topic covers the Zero Trust method. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA
  continue reading
 
Boo! 🎃 Halloween may not be here yet, but we’re kicking off the spooky vibes early! Donna and David dive into the eerie world of cybersecurity, where the tricks are plentiful, and the treats are hard to find. From scary ransomware attacks to the horrifying reality of business email compromises, the internet is scarier than a haunted house with no e…
  continue reading
 
In this episode of The Medcurity Podcast, we’re talking about building an Incident Response Plan, why it matters, and how often you should review it to stay ahead of threats. Plus, we share practical tips to make sure your plan is ready when you need it most. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Complia…
  continue reading
 
Healthcare marketing is tricky enough without tripping over the big pitfalls that could leave you tangled up in HIPAA violations or a patient privacy disaster. Today we break down five common marketing mistakes you definitely want to steer clear of. From misinterpreting HIPAA rules to guarding patient data like it’s your grandma’s secret cookie rec…
  continue reading
 
How should Protected Health Information (PHI) be disposed of? In order to avoid stolen data and/or HIPAA violations, learn how to properly dispose of PHI, follow regulations, and keep your staff updated on effective disposal methods. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA…
  continue reading
 
Do you feel like cyberattacks are the world’s worst game of whack-a-mole? No matter how many you smack down, ten more pop up— and there’s no sign of it slowing anytime soon and neither is the confusion over who’s responsible when your data gets caught in the crossfire. If your supply chain and your own security safeguards aren't locked down, you mi…
  continue reading
 
What happens when a device with sensitive information is lost or stolen? In this episode, we break down how HIPAA factors in, what steps to take if it happens, and how to stay ahead with preventive measures to protect your data and stay compliant. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPAA…
  continue reading
 
Ever left your front door unlocked, thinking it’s no big deal? Well, that’s what happens when you forget about facility access controls – and the consequences can be far worse than a missing TV! Today, we dive deep into a topic that often gets overlooked but is critical to any organization’s security – facility access controls. Whether it's ensurin…
  continue reading
 
In this episode of The Medcurity Podcast, we take a closer look at the HIPAA Omnibus Rule - what it means, why it’s important, and how it impacts your practice. Gain valuable insights, expand your knowledge, and stay ahead in the world of compliance. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #HIPA…
  continue reading
 
It's that time of year again: Cybersecurity Awareness Month! We're diving into the world of cybersecurity like a hacker in a candy store—except we're here to keep the candy (your data) safe! We're breaking down how you can use the free CE Awareness Month toolkit to boost your cybersecurity game both in your business and at home. Whether you're an I…
  continue reading
 
Is your social media activity HIPAA compliant? What can / can’t you post / respond to? Learn about social media standards when it comes to HIPAA compliance, and steps to take to make sure your activity on these platforms is not violating any HIPAA rules. Learn more about Medcurity here: https://medcurity.com #Healthcare #Cybersecurity #Compliance #…
  continue reading
 
Navigating the world of cybersecurity these days feels like walking through a minefield with clown shoes—are you stepping safely or just a step away from disaster? In this episode, we dive into the jaw-dropping National Public Data breach that's got everyone asking, "Am I a victim too?" Spoiler alert: the odds aren't in your favor. Then, we sift th…
  continue reading
 
Cybersecurity can save your organization from a costly attack. In this episode, we explore how the right protections will help you save money in the long run by preventing costly incidents and keeping your practice compliant. Find out why cybersecurity is one of the smartest financial moves you can make. Learn more about Medcurity here: https://med…
  continue reading
 
In this episode, we're diving deep into the world of Software Bill of Materials (SBOM)—basically, the recipe for your software, minus the secret sauce. If you've ever wondered what's really under the hood of your favorite apps (or been caught off guard by a sneaky ingredient), this one's for you. We’re breaking down why you should care about SBOMs,…
  continue reading
 
While cybersecurity grabs all the headlines, it’s easy to forget how important physical security is. In this episode of the Medcurity podcast, we focus on the tangible measures—access controls, surveillance systems, visitor management, and secure storage—that protect your facility’s most sensitive areas. Learn how to strengthen your physical defens…
  continue reading
 
Navigating healthcare cybersecurity is like walking through a minefield—you never know which step could trigger the next explosion. In this episode, we’re diving headfirst into the bloody mess of ransomware attacks that have turned hospitals and blood banks into a logistical nightmare. Amidst the chaos, Health-ISAC and the American Hospital Associa…
  continue reading
 
OCR audits are ramping up in 2024, and healthcare organizations need to be ready. In this episode of the Medcurity podcast, we discuss what these audits will focus on, including risk analysis, technology protections, and third-party management. We also share actionable steps to strengthen your compliance efforts and ensure you're prepared for the h…
  continue reading
 
How well do you really know your remote workers? With remote work increasingly becoming the norm, the complexities of securing devices and monitoring access have skyrocketed. The challenges of providing robust security measures for an increasingly dispersed workforce are immense. Real-world examples like the KnowBe4 incident, where a remote worker …
  continue reading
 
AI is being used to target your data. In this episode of the Medcurity podcast, we talk about the latest AI scams hitting the healthcare world. Discover how cybercriminals are using artificial intelligence to hack systems and steal sensitive info, and get practical tips to protect yourself. Learn more about Medcurity here: https://medcurity.com…
  continue reading
 
Ever had one of those days where everything just seems to crash and burn? Well, in this episode, we dive into a tech catastrophe that sent ripples across the digital landscape. Donna and David will unravel the chaos caused by CrowdStrike's major tech outage—a meltdown that wasn’t just an ordinary hiccup, but a vendor-of-a-vendor fiasco. From blue s…
  continue reading
 
The Department of Health and Human Services and the FBI have issued a joint advisory warning healthcare providers about a targeted social engineering campaign. We break down what this means and how you can protect your organization in our latest episode of The Medcurity Podcast. Learn more about Medcurity here: https://medcurity.com…
  continue reading
 
Ever wondered how neglecting a cybersecurity risk analysis is like leaving your front door wide open in a sketchy neighborhood? Well, buckle up because today we dig into the latest OCR ransomware settlement involving Heritage Valley Health Systems and a laundry list of potential violations. From failing to conduct a thorough risk analysis to lackin…
  continue reading
 
In the HIPAA world, just because you can, doesn't mean you should – unless you’re keen on trading your business casual for prison orange. No one expects that a HIPAA violation will send them to jail, but there can be serious criminal penalties associated with HIPAA breaches, ranging from fines to imprisonment. Today, we will share real-life example…
  continue reading
 
How can small and medium businesses (SMBs) tackle the complexities of single sign-on (SSO) and boost their password security? A recent study from CISA highlighted the lag in SSO adoption among SMBs and why basic security measures like SSO and multi-factor authentication (MFA) should be standard. Join us as we navigate through the maze of managing m…
  continue reading
 
Ever wonder why staying vigilant in cybersecurity is like playing whack-a-mole? Let's dive into some wild stories that highlight the need to always be on the lookout! From hackers using legitimate websites to spread malware, to the humorous and slightly terrifying saga of employees using mouse jigglers to fake work, to cyberattacks from space, ther…
  continue reading
 
What happens when healthcare giants falter in the face of cyber threats? Today, we dive into the critical need for better cybersecurity investments, continuous training and education and robust cybersecurity standards. We will explore the fallout from UHG’s cyber incident and break down three fiery letters from Congress demanding accountability and…
  continue reading
 
Today, we're diving into a topic that might keep you up at night and might make you reconsider your relationship with your Wi-Fi router. Picture this: your internet goes down, and it's not just a blip—it's a full-blown blackout. We're talking no Netflix, no Zoom meetings, and definitely no online shopping. We’ll unravel the chaos that ensues and di…
  continue reading
 
Join us for an engaging episode where Joe Gellatly, CEO of Medcurity, and Daniel Schwartz, President and Founder of Design I.T. Solutions, dive into the pressing topic of cybersecurity in the healthcare sector. They discuss: AI in Cybersecurity: How artificial intelligence is transforming cybersecurity practices and what it means for your organizat…
  continue reading
 
Join us as we debunked some common myths about what Security Risk Analysis isn't and then cruise through the seven essential steps to conduct a complete and thorough SRA for any organization. It’s not just a one-off IT review or a checkbox on compliance forms—it’s an ongoing, dynamic process. From identifying what you need to protect to managing ho…
  continue reading
 
Get ready for our latest episode where we’re discussing the alarming 74 percent rise in ransomware attacks in 2023, with sectors like healthcare being particularly hard hit. We’ll share essential strategies for protecting your organization, including enhancing infrastructure, conducting security audits, and developing a robust incident response pla…
  continue reading
 
Today we dive into the world of compulsive clickers—the folks who just can't help but tap on every tantalizing link that winks at them from their inbox. It's not just a harmless habit; these clicks can lead to some pretty sketchy places. Imagine a world where every click could be a potential minefield, threatening your digital safety with every tap…
  continue reading
 
DDoS attacks are a growing threat to organizations of all sizes. What are they and what impact do they have on you? Tune in to find out. In this episode, we’er covering: Understanding DDoS Attacks: What DDoS attacks are and how they work to disrupt your services. Immediate Impact: The potential damage to business operations, financial losses, and c…
  continue reading
 
Imagine juggling the intense world of cybersecurity where you're constantly putting out digital fires, with trying to keep your own mental batteries charged. It's like being a superhero who also needs to take some me-time. Our discussion dives into how we can manage the high-stakes of cybersecurity and stress-packed jobs while also making sure we d…
  continue reading
 
The Ascension breach has rocked the healthcare sector, and we're breaking down what happened. In this episode, we cover: - The Ascension Breach: How the Black Basta group managed to breach one of the largest healthcare associations. - Immediate Impact: Delays in patient care, administrative chaos, and over 1.2 million patient records exposed. - Key…
  continue reading
 
It is time to review the annual Verizon Data Breach Investigaton report. First, we will hit the big notes from their summary. Then, we can add in a few tidbits from the bigger report details. We'll break down key statistics, discuss emerging threats, and offer insights into what these findings mean for the health sector and HIPAA privacy and securi…
  continue reading
 
How are phishing attacks evolving, and what can healthcare organizations do to defend against them? In this episode, we share the latest phishing tactics targeting the healthcare sector - from spear phishing to vishing and smishing. Discover how cybercriminals are becoming more sophisticated and the devastating impacts these attacks can have on hea…
  continue reading
 
Loading …

Ghid rapid de referință