Giva Blog Categories : Security

What is the Open Web Application Security Project (OWASP) Top 10 Risk List for Software Apps?

OWASP Top 10 Security Risks

Photo Attribution: khaleddesigner/Shutterstock.com

Building software products is inherently risky. Regardless of cloud providers and security vendors you might work with, the Web, as we know it, is a high-risk environment for software developers and applications.

Cybercrime is on the rise. Cybercriminals, either in organized gangs, professional criminal hackers (sometimes known as Hacking as a Service), and even unhappy employees or contractors will always find a way to weaken an organization's security.

[Read More]

7 Ways to Improve Customer Data Privacy Management and Software

Customer Data Privacy Management

Photo Attribution: Jane Kelly/Shutterstock.com

Customer data privacy management is essential in all business sectors, not only from a legal perspective, but as part of the customer experience. Customers trust organizations and service providers with their information and personal data.

Any organization that fails to provide reasonable and adequate safeguards for personal information and data is in breach of what customers and legislation expects.

[Read More]

"I'm Not a Doctor." But Are You a HIPAA Business Associate? Why You Should Care About HIPAA

Non-Medical HIPAA Business Associates

Photo Attribution: IR Stone/Shutterstock.com

Who does HIPAA apply to? A common misconception is that HIPAA only applies to healthcare organizations and their administrators, like family practitioners, cardiologists, and hospitals. While it is a predominant concern for this sector and its related specialists, HIPAA coverage expands to many other industries — anywhere there is personal health information (PHI) collected, stored, or shared — think of personal injury law firms as an example. So, if you work or use services outside of the healthcare field, you should educate yourself on how HIPAA rules and non-compliance can affect you, and we have some tips for consideration.

[Read More]

Understanding HIPAA Telephone Rules and Phone Calls

HIPAA Telephone Rules & Phone Calls

Photo Attribution: Succo Design/Shutterstock.com

We live in a hyper-connected society. Almost everyone we know has a cell phone, tablet, or computer — maybe all and more. These devices are designed to make our day-to-day activities more efficient and enjoyable. While healthcare is rarely an enjoyable experience, there are always means that can be used to make it more comfortable. One of those solutions comes with improved technology that allows patients and providers to communicate and share data with speed and ease. The most common way improved communication occurs between both parties is through personal electronic devices, like smartphones. Although this sounds like a great idea, it has not exactly taken off. This is mainly because HIPAA still applies.

[Read More]

12 Questions Mental Health Providers Ask When Evaluating EHR Tools

Selecting mental health EHR Software

Photo Attribution: Andrew Rybalko/Shutterstock.com

Those working as mental health providers over the last decade have experienced a shift in how tools are used to help their practices. This is true for both large mental health facilities and solo practitioners. Electronic health record (EHR) tools along with electronic medical record (EMR) tools have made many processes easier for mental health professionals, whether they be behavioral health, therapy, counseling EHRs, or any number of mental health categories.

[Read More]

Is Google Workspace HIPAA Compliant? Gmail, Meet, Drive & Other G Suite Apps

Is Google Workspace HIPAA Compliant

Photo Attribution: Tada Images/Shutterstock.com

Rising data breaches in healthcare have paved the way for compliance laws to keep patients' medical data secure. Thousands of healthcare providers in the US are now legally required to adhere to the Health Insurance Portability and Accountability Act (HIPAA). As a result, they need to use HIPAA-compliant technologies when corresponding with clients and patients online. 

[Read More]

Virtual Private Network (VPN) Pros and Cons for Business

VPN Pros and Cons for Business

Photo Attribution: TarikVision/Shutterstock.com

Virtual Private Networks (VPNs) were already popular amongst numerous organizations and sectors before the pandemic. Now, with remote and hybrid work so widespread, companies need to be even more conscious of the way they allow employees and contractors to access files and internal systems.  You may ask "Do VPN's really work?" Continue reading to find out.

[Read More]

The Biggest Healthcare Challenges for 2022 (and Beyond)

Healthcare's Biggest Challenges

Photo Attribution: Inspiring/Shutterstock.com

The onset of the COVID-19 pandemic has driven the healthcare industry through several simultaneous changes and challenges. Record patient levels, hospital staff shortages, remote work, and HIPAA exemptions have all made appearances at one point or another. Healthcare organization CEOs and other management figures have dealt with many of these situations on the fly, without much warning. As we progress through 2022 and beyond, what should the industry expect from a change perspective? Continue reading to find out how you can stay ahead of the curve! 

[Read More]

Top Cybersecurity Threats to Healthcare in 2022

Top Cybersecurity Threats to Healthcare in 2022

Photo Attribution: Jaiz Anuar/Shutterstock.com

The healthcare industry is subject to many types of existing and new cybersecurity threats. With technology constantly developing and information considered to be highly valuable, cyber criminals see this industry as a gold mine of sorts. Crime can also occur internally, with employees playing the part of "bad actor."

[Read More]

Does Title 42 CFR Part 2 Confidentiality of SUD Patient Records Apply to You?

SUD Privacy

Photo Attribution: Volonoff/Shutterstock.com

People with alcohol or drug use disorders do not always seek treatment for their substance use disorders because of fear: fear of the social and legal consequences if family, friends, neighbors, employers, co-workers, law enforcement, and even medical personnel learn of their substance abuse.

Protecting that privacy and encouraging treatment for substance use disorders (SUD) is the purpose of Title 42 of the Code of Federal Regulations (CFR) Part 2: Confidentiality of Substance Use Disorder Patient Records (Part 2).

[Read More]

 

1   2   3   4   5   6   ...   16     Older Entries