Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

What It Means To Be HIPAA Compliant

HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) was established in the U.S. in 1996 to protect an individual's personal health care information. Healthcare institutions are required to meet all standards and comply with the appropriate security measures in order to safeguard patient data. These standards became enforceable by law on 21 April, 2005.

[Read More]

Healthcare Cybersecurity to be Highlighted at HIMSS17 Conference: Orlando, Florida, Feb 19-23, 2017

HIMSS17

Cyber security has become an important issue for healthcare organizations as attacks on the industry, and in particular on private patient information, have grown more prevalent. A timely opportunity to learn more about the current state of healthcare cyber security, as well as many other pertinent issues in healthcare, is coming soon. The Healthcare Information and Management Systems Society (HIMSS) is hosting their 2017 Conference and Exhibition from February 19th to the 23rd at the Orange County Convention Center in Orlando, Florida.

[Read More]

What is HITRUST vs. HIPAA?

HITRUST

The Health Insurance Portability and Accountability Act (HIPAA), which passed in Congress in 1996, outlines protection and security standards for health care data. Although this was passed twenty years ago, it is still very much relevant to companies today. A new acronym you may have heard recently is HITRUST, or the Health Information Trust Alliance. Many are under the impression that HIPAA and HITRUST are at odds with each other and fail to understand how the two are related.

[Read More]

Connected Medical Device Security to be Explained during February 8th, 2017 Webinar

HIMSS Connected Medical Devices Security Webinar

Security should be a top priority when it comes to protecting the most private information found on an organization's connected medical devices. Though as many of us know, in a world where cyber-attacks are becoming more prevalent, protecting this information is becoming far more challenging.

An opportunity to learn more about potential risks and protection of this particular technology is upcoming, when the "Connected Medical Devices: How Well are They Secured?" webinar begins on February 8th, 2017 at 12:00PM CT. It is a complimentary event hosted by Mayuresh Ektare, VP of product management for Silicon Valley startup ZingBox, and in association with The Learning Center powered by HIMSS.

[Read More]

HIPAA-Compliant Text Messaging and Why You Need It

HIPAA-Compliant Secure Text Messaging

Running a hospital presents a variety of unique challenges. It is like many other businesses as it requires effective leadership and communication to run smoothly, but the extra factor is the importance of timeliness. All businesses require quick employee response, but this could not be truer for a healthcare facility. Patients and their health can be unpredictable. There should be a method of reaching healthcare professionals in a timely manner while still protecting the sensitive information being transmitted.

[Read More]

Why This Producer of ID Cards Fell Victim to Data Breach

Newkirk & Healthcare Data Breaches

Newkirk Products, Inc., a company that produces ID cards for health-insurance plans reported a data breach earlier in 2016 involving unauthorized access to a server holding member information. The company reported that no social security, banking, credit card or medical data was stored on the breached server.

[Read More]

Privacy Measures for Healthcare HIPAA Compliance

HIPAA Compliance

Being HIPAA compliant is a must for companies involved in healthcare. In 2009 the U.S. government passed the Health Information Technology for Economic and Clinical Health Act (HITECH) specifically requiring audits by the U.S. Department of Health and Human Services' Office for Civil Rights. There are many ways to ensure that your business is HIPAA compliant, such as having secure software. To do that, raising privacy and security standards is of the utmost importance. Here are a couple of steps you can take to keep your protected health information secure and ready yourself for HIPAA audits.

[Read More]

Blockchain Startup Chainalysis Helping to Arrest Cyber Criminals

Bitcoin Tracking Cybercrime

For the past several years, bitcoin has been a way to keep financial transactions discreet. It is incredibly difficult to trace, because it does not pass through a financial institution, and it is secure because it requires a two factor identification that uses a public key and a PIN combined with a mathematical function to allow a transaction.

This has made it easy for ransomware hackers to extort money by decrypting the victim's files. These types of attackers typically demand payment in bitcoin to keep from being traced. But for the past two years, Chainalysis, a bitcoin-tracing tech startup, has been selling its product to law enforcement agencies around the world.

[Read More]

Healthcare Industry Wants to Increase Cybersecurity

Healthcare Industry Increasing Cybersecurity

The Healthcare industry will forever be the target of cyber attacks due to the wide array of information included in the healthcare record. The 2016 HIMSS Cybersecurity Survey released in August shows that most healthcare executives are elevating data security as a business priority.

The survey asked 150 IT security leaders if they planned to increase cybersecurity awareness, in which case 85 percent of respondents said that they did. The numbers show that data security is an issue of concern for employees who handle information in the US health sector.

[Read More]

Healthcare IT Professionals Making Data Security a Priority

Healthcare Data Security

The health IT spending intentions survey conducted by TechTarget reveals that security is a top priority in the healthcare industry. The healthcare record is a valuable target for hackers and scammers, as it contains personal information, medical history and payment information.

[Read More]

 

Newer Entires     1   2   3   4   5   6     Older Entries