HIPAA Risk Assessment or a Gap Analysis?  And Why Does It Matter?

Is it a HIPAA Risk Assessment or a Gap Analysis?  And Why Does It Matter? 
on Aug 5, 2016 10:00 AM PST at: http://www2.lumen21.com/riskassesment-or-gap-analysis


Ask any IT department what is required to comply with the HIPAA Security Rule, and you’ll likely hear things like data encryption, unique user IDs, and strong passwords. You might even hear about documented policies, anti-virus software, and removable media controls. But you are less likely to hear about the first required specification in the HIPAA Security Rule, a risk analysis. Continue reading HIPAA Risk Assessment or a Gap Analysis?  And Why Does It Matter?

Adding a key component to your Arsenal of Defense against Data Breaches

A recent 2016 Ponemon’s 2016 Cost of Data Breach Study: Global Analysis reveals the average total cost of a data breach for the 383 companies participating in the research increased from $3.79 million to $4 million. They found that the average global cost of data breach per every lost or stolen record is $158. Healthcare organizations, however, had an average cost of $355 per record, according to the new survey. Continue reading Adding a key component to your Arsenal of Defense against Data Breaches

Increase Cloud Adoption Formula in Healthcare with greater Peace of Mind

In a recent article that appeared in Healthcare IT News, HyTrust, a company specializing in encryption for storage and virtual environments, conducted that found there was a rise in the percentage of Healthcare organizations planning on moving some of their applications to the cloud. Continue reading Increase Cloud Adoption Formula in Healthcare with greater Peace of Mind

Tech Support Scams: A deceptive way to con people

With the rising number of scams in the digital world, the number of Tech Support Scam complaints reported to the Internet Crime Complaint Center (IC3), just between January 1, 2016 and April 30, 2016 reached 3,668.

A Tech Support Scam is when an attacker calls pretending to be a technical support person associated with a legitimate-sounding, but phony, third-party provider. These folks, called scammers, will try and convince you to give them remote access to your device using their social engineering skills.  If the device is a phone or a tablet, the scammer will ask you to connect it to a desktop or a laptop. Once the scammer has remote control of your device, the scammer will claim to have found multiple viruses or scareware on the device and will tell you that it needs to be fixed immediately. The scammer will try and convince you to pay a fee with a personal check, debit/credit card or wire transfer the payment. Continue reading Tech Support Scams: A deceptive way to con people

Secure Document Phishing Attacks

A fresh wave of spear phishing has hit the markets with a newly themed scam called “Secure Doc”.

Spear phishing is considered to be the most specific type of phishing attack, as it’s directly targeted at an individual or an organization. This form of phishing has become one of the most prevalent phishing techniques and has seen an exponential rise with the highest success rates. Continue reading Secure Document Phishing Attacks

New guidance for preventing healthcare cyberattacks

The Federal regulators from HIPAA have issued new guidelines for the healthcare organizations to augment their defenses for cyber security. The Department of Health and Human Services Office for Civil Rights (OCR) outlined steps to avoid falling victim to the rising threats. The guidance was issued to prevent the spread of malware, following several attacks that affected the health care industry, so much as to temporarily shut a 10-Hospital system network. Continue reading New guidance for preventing healthcare cyberattacks