Giva Blog Categories : Security

Virtual Private Network (VPN) Pros and Cons for Business

VPN Pros and Cons for Business

Photo Attribution: TarikVision/Shutterstock.com

Virtual Private Networks (VPNs) were already popular amongst numerous organizations and sectors before the pandemic. Now, with remote and hybrid work so widespread, companies need to be even more conscious of the way they allow employees and contractors to access files and internal systems.  You may ask "Do VPN's really work?" Continue reading to find out.

[Read More]

The Biggest Healthcare Challenges for 2022 (and Beyond)

Healthcare's Biggest Challenges

Photo Attribution: Inspiring/Shutterstock.com

The onset of the COVID-19 pandemic has driven the healthcare industry through several simultaneous changes and challenges. Record patient levels, hospital staff shortages, remote work, and HIPAA exemptions have all made appearances at one point or another. Healthcare organization CEOs and other management figures have dealt with many of these situations on the fly, without much warning. As we progress through 2022 and beyond, what should the industry expect from a change perspective? Continue reading to find out how you can stay ahead of the curve! 

[Read More]

Top Cybersecurity Threats to Healthcare in 2022

Top Cybersecurity Threats to Healthcare in 2022

Photo Attribution: Jaiz Anuar/Shutterstock.com

The healthcare industry is subject to many types of existing and new cybersecurity threats. With technology constantly developing and information considered to be highly valuable, cyber criminals see this industry as a gold mine of sorts. Crime can also occur internally, with employees playing the part of "bad actor."

[Read More]

Does Title 42 CFR Part 2 Confidentiality of SUD Patient Records Apply to You?

SUD Privacy

Photo Attribution: Volonoff/Shutterstock.com

People with alcohol or drug use disorders do not always seek treatment for their substance use disorders because of fear: fear of the social and legal consequences if family, friends, neighbors, employers, co-workers, law enforcement, and even medical personnel learn of their substance abuse.

Protecting that privacy and encouraging treatment for substance use disorders (SUD) is the purpose of Title 42 of the Code of Federal Regulations (CFR) Part 2: Confidentiality of Substance Use Disorder Patient Records (Part 2).

[Read More]

7 Tips for Protecting Yourself Against Cyber Attacks

7 Tips for Protecting Yourself Against Cyber Attacks

Photo Attribution: aurielaki/Shutterstock.com

In April 2021, Colonial Pipeline, representing critical regional gas supply and fuel infrastructure, was severely disrupted by a ransomware attack. The company's billing and business infrastructure were targeted, resulting in a $4.4 million dollar ransom payment in bitcoin. The ripple effects of the attack caused panic buying and gas shortages in many states along the East Coast of the United States, not to mention dangerous chaos among residents. This all may have been avoided if the firm had adequate or stronger cybersecurity measures in place. This example, among many others, serves as a reminder that no one organization or person is safe from a potential cyber-attack. Oftentimes the best defense is being well-prepared for the inevitable.

[Read More]

3 Simple Tips For Improving Your Cybersecurity Hygiene

3 Simple Tips For Improving Your Cybersecurity Hygiene

Photo Attribution: Axtem/Shutterstock.com

Nowadays, more than ever before, we are reminded to stay on top of our hygiene. Whether it is frequently washing our hands, sanitizing work stations, or keeping our distance from others, regular practice is key to preventing illness.

As we develop routines to keep ourselves physically clean, it is important to ensure that we also do not neglect the regular protocols that our technology demands. From computers to mobile phones and everything in-between, in 2021 there were approximately 11.3 billion connected devices worldwide. This number is forecast to grow to 27.1 billion by 2025. These very devices are often home to our most sensitive data. Keeping these items safe from hackers, viruses, and malfunctions requires regular upkeep. With this in mind, we have a few important considerations for building out a new or stronger "immune" system for your cybersecurity hygiene plan.

[Read More]

HHS Launches 405(d) Website for Cybersecurity in Healthcare

HHS 405d

The Cybersecurity Act of 2015 was designed to create a bridge between the Department of Homeland Security (DHS) and its National Cybersecurity & Communications Integration Center (NCCIC) to ease and secure cybersecurity-related information sharing that can be private or public. It was signed into law on December 18, 2015, by then-president Obama, and is considered the most important cyber-related federal law passed to date that facilitates cybersecurity-related information sharing between private sector companies and federal government organizations in a secure way, having a set mechanism. The Cybersecurity Act 2015 outlines NCCIC's role in assessing and reacting to cybersecurity risks and threat indicators. It gives authority to the president of the country to transfer control to deal with the cybersecurity threat to an entity other than NCCIC, even outside the DHS, except to the Department of Defense.

[Read More]

This is How Asset Management Can Play an Integral Role in Cybersecurity

This is How Asset Management Can Play an Integral Role in Cybersecurity

Photo Attribution: Artur Szczybylo/Shutterstock.com

When it comes to technology, an asset management system should be an important part of any IT professional's "toolbox", serving a wide variety of purposes. It can help an organization discover efficiencies in its technology lineup. It can help to regulate maintenance schedules and even help IT professionals uncover additional uses for certain devices.

[Read More]

Is This a HIPAA Violation? Take Our HIPAA Quiz

HIPAA Violations Quiz

Photo Attribution: Monte Cristo 007/Shutterstock.com

Organizations in the healthcare field will be familiar with HIPAA, formally known as the Health Insurance Portability and Accountability Act. Signed into law in 1996, it sets a national standard for protecting personal health information (PHI). It ensures that patients know how their information is stored and shared through consultation and consent. According to the HIPAA Journal, in the twelve months leading up to October 2021, there were 655 reported data breaches that contained 500 or more records across the country. 546 of the 655 occurred in 2021 alone. There is room for improvement in protecting sensitive PHI, especially when dealing with large databases.

[Read More]

HIPAA Waivers During COVID: What to Expect in 2022

HIPAA Waivers During COVID What to Expect in 2022

Photo Attribution: one photo/Shutterstock.com

Global pandemics like COVID-19 are unprecedented situations, which call for unprecedented action. This mantra is especially true in the field of healthcare, where in early 2020, operations shifted to pre-dominantly virtual care. This action was initiated to keep people apart and from further spreading a virus we knew so little about.

[Read More]

 

1   2   3   4   5   6   ...   16     Older Entries