The Verizon enterprise has recently issued its 2020 Data Breach Investigations Report (DBIR). The report analyzes security compromises between November 1, 2018 and October 31, 2019. It investigates cyber attack tactics, parties responsible, commonalities, motivations and popular victims, as well as helps to recommend cybersecurity measures that organizations should be adopting. Here are several key conclusions drawn from the report.
Though aimed at being a convenient alternative, telehealth practices must do their best to replicate in-person visits. With that being said, all data being shared between patient and provider is done virtually, meaning that extra precautions should be taken to protect sensitive personal health information (PHI).
For organizations of all sizes, physical equipment can present several challenges. From space constraints to the additional overhead of repairing and maintaining equipment, the liability this technology presents is no longer worth the additional strain it places on IT leaders and their budgets.
As data breaches become more frequent and complex, healthcare organizations are encouraged to become familiar with HIPAA's Breach Notification Rule.
What is the HIPAA Breach Notification Rule?
According to Health IT Security, the HIPAA Breach Notification Rule requires HIPAA covered entities to provide notification to individuals, regulators, and the media following a breach of protected health information (PHI).
When it comes to technology, an asset management system should be an important part of any IT professional's "toolbox", serving a wide variety of purposes. It can help an organization discover efficiencies in its technology lineup. It can help to regulate maintenance schedules and even help IT professionals uncover additional uses for certain devices.
Any business operating in Canada that sends commercial electronic messages must comply with Canada's Anti-Spam Legislation (CASL). This legislation came into effect on July 1st, 2014, but has since included two further updates. Commercial electronic messages include transmissions such as email that promotes a product or service; a practice which many businesses use today to both communicate and market to current and potential customers.
Pivot has become the buzzword in the business world since the start of the COVID-19 pandemic. One key aspect that businesses have had to change is their workplace infrastructure from on-site to remote locations. While many are starting to adopt technology to become a more versatile remote culture, those who have been unable to take their business into the digital world have suffered tremendous loss; some having to permanently close their doors.
There are millions of people using email daily in organizations across the United States. A preferred way of communication, emails can regularly contain sensitive data going in either direction. As many individuals receive a fair amount of email daily, it can be difficult to pay attention to small anomalies that might indicate something suspicious about the sender or the included content.
In order to remain safe from potential phishing attacks, we have put together a guide of three important tips to consider before replying to that next email.
Healthcare's shift into a digitized industry with telehealth is also becoming a shift into a better customer experience. Historically, patients may receive accurate and excellent healthcare, but at the expense of a high quality customer experience.
However, with the increasingly competitive telehealth market that can now reach further than just the vicinity of a local clinic, doctors must start heavily factoring in customer experience with their telehealth services. There are multiple ways to achieve this, from employing UX/UI designers who enhance hospital and clinic sites or apps to even rebrand your organization's infrastructure in a customer-centric method.
In October of 2019, the Department of Health and Human Services Office for Civil Rights (OCR) and the Office of the National Coordinator for Health Information Technology (ONC) released version 3.1 of the Security Risk Assessment Tool (SRA).