Case Study- Hook, Line, and Sinker: Falling for a Phishing Scam
A HIPAA Prime client emailed and called us on a Tuesday afternoon to let us know that earlier that day their email had been hacked and a phishing email was sent out to over 1,000 contacts that included clients. The Total HIPAA Compliance Team immediately called...
Case Study-Health and Human Services (HHS) Office of Civil Rights (OCR) Comes to Town
We received a call from a new client that came to us with a breach, and needed a comprehensive HIPAA Compliance Plan as quickly as possible in preparation for an HHS Audit. The Breach Years ago this client hired a very reputable Business Associate (BA) to store...
3 Reasons Insurance Agents Need to Follow HIPAA
Health insurance agents became covered under HIPAA with the HITECH Act of 2009. The inclusion of insurance agents was a response to the increasing use of electronic health records and the need to safeguard patients’ medical information. Besides the moral and...
Why You Should Be Using Two-Factor Authentication
While strong, complex passwords are an effective first line of defense when securing business accounts and applications, they are not fool proof and can be compromised if a hacker gains access to company systems. Two-factor authentication (2FA), also known as...
