HIPAA and Cloud Computing Part II
Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to begin for business associates with desk audits in November 2016. OCR is randomly selecting business associates for these desk audits from a pool of...
Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra protection to your files by minimizing the risk of a breach in the event your device is lost or stolen. This is because an encrypted and password protected...
OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates in October motivated a Covered Entity’s compliance officer to call Total HIPAA last week. He had done a Google search on what a Covered Entity should do...
Strong Passwords – Your Employees Most Important Contribution to Network Security
Are your passwords so easy that a seven year old can figure them out? In 2012, Dropbox verified that the user information of 68 million Dropbox users was stolen. This information included both usernames and passwords. Though Dropbox was aware of this breach, there was...
