Cyber security news & events blog
Check out the latest trends, events, and stories relating to cyber security and privacy.
What is ePHI?
Electronic Protected Health Information or ePHI is characterized by the HIPAA privacy rule as any protected health information produced, stored, sent, or received in electronic format. For healthcare providers or any HIPAA-covered entity to be fully HIPAA compliant....
HIPAA Violation Examples & 6 Steps To Help Avoid Them
Data breaches and HIPAA violations are now more predominant than ever. Even with the most potent cybersecurity barricades protecting your patient information and accounts, hacks and data breaches are still something to be concerned about. In online fraud and data...
The HIPAA Omnibus Rule Explained
The HIPAA Omnibus Rule, an extension of the Health Insurance Portability and Accountability Act (HIPAA) contains revisions and updates of all other previously passed rules and specifically addresses how healthcare facilities may handle electronic health records, PHI,...
5 Ways You Didn’t Know You Could Violate HIPAA Laws
Since the start of the coronavirus pandemic in March of 2020, HIPAA has been a popular topic that keeps coming up in mainstream media outlets, professional sports, political talks, and throughout the healthcare industry. Although HIPAA has been established since 1996,...
Zoom for Healthcare Professionals – Is Zoom HIPAA Compliant?
First, The Health Insurance Portability and Accountability Act (HIPAA) was established in 1996 to protect a person’s private health information and inaugurate a specific set of security standards around electronic health records and health plans. Zoom is a video...
The Guide to HIPAA Compliant Email for Therapists.
Solo practitioners or private practice therapists providing services that access, store, or transmit protected health information must be HIPAA compliant. In short, any business or organization that electronically handles health information and transactions is...