Are Major Websites Always Secure? and How To Protect Yourself

https

Website development is becoming more and more complex. Having to accommodate for multiple landing pages, signup methods, and various platforms and browsers (mobile, tablet, desktop, android, apple, chrome, Firefox, etc..) it is very possible to overlook some security hole(s) somewhere. That can be the case for any website, and you should not trust a website

Continue reading »

Breach Alert: Hackers stole over 4.5 million records from a Hospital Network

Medical Records Breach

Community Health Systems announced on Monday that hackers recently broke into its computers and stole data on 4.5 million patients. The company operates over 206 hospitals in 28 states including Alabama, Florida, Mississippi, Oklahoma, Pennsylvania, Tennessee and Texas. Apparently the hack originated from China and used a high end malware to breach the companies network sometime in April

Continue reading »

What is Risk Analysis (Section 19 of the HIPAA Security Rule)

HIPAA Risk Analysis

Risk Assessment otherwise called Risk Analysis is a Required part of the HIPAA Security Rule 164.308(a)(1). To ensure compliance, health care providers, medical offices (Covered Entity), business associates, or any other entity that receives, transforms, or stores Electronic Protected Health Records (ePHI)  are required to perform a Risk Analysis at least once a year or

Continue reading »