COVID-19HIPAAHIPAA SecurityHIPAA ViolationsPrivacy Steps to Avoid Teleconference Hijacking In response to the COVID-19 pandemic, there has been a significant increase in the number…John DiMaggioApril 22, 2020
COVID-19HIPAAHIPAA SecurityHIPAA ViolationsSample Resources A Teleworking Policy Is a Must During COVID-19 Having a Teleworking Policy Is a Must During COVID-19 In response to the COVID-19 pandemic,…John DiMaggioApril 21, 2020
HIPAA Privacy Compliance Your 6-Point Guide to Addressing Individuals Rights Under the HIPAA Privacy Rule Individuals have certain rights under the HIPAA Privacy Rule regarding the use and disclosure of…John DiMaggioAugust 2, 2019
Alexa Compliance Alexa in Senior Care Settings: HIPAA Considerations and Safeguards In April 2019, Amazon announced that its Alexa Skills Kit now enables select covered entities…John DiMaggioJune 18, 2019
Ransomware Could Your Organization be the Next Ransomware Victim? Ransomware is a type of malware that restricts access to the infected computer system...John DiMaggioJune 7, 2019
Cybersecurity Healthcare IT Cybersecurity News of a healthcare security breach or ransomware incident has become almost commonplace. Hackers have developed…John DiMaggioJune 5, 2019
Penetration Testing Healthcare IT Security- The Case For Penetration Testing HIPAA law requires covered entities to safeguard against “reasonably anticipated” threats to protected health information. With…John DiMaggioMay 27, 2019
HIPAA Privacy Compliance Don’t Forget About HIPAA Privacy! In today’s world of HIPAA regulations, not developing a plan for privacy compliance is risky…John DiMaggioMay 15, 2019