Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

My Business Just Experienced a Cyber-Attack!

What’s New?

Health and Human Services, Office for Civil Rights (HHS OCR) released a cybersecurity checklist and infographic in response to the WannaCry ransomware attacks in 2017.

HHS OCR provides a breakdown of the steps covered entities, business associates and subcontractors must do to properly respond to a ransomware attack or cyber-related security incident that compromises PHI. They are providing a checklist and infographic as part of the campaign to raise awareness and improve readiness by entities when dealing with cyber-attacks.

What do we do now?

  • Respond – Execute contingency plans and response and mitigation plans which are part of your disaster recovery plan. (HIPAA compliance will prepare your organization)
  • Report the Crime – Report the crime to law enforcement agencies. This could include local or state law enforcement, FBI, and/or the Secret Service.
  • Report Threats – Report all cyber threat indicators to the appropriate federal agencies and information-sharing and analysis organizations; this would be the Department of Homeland Security and HHS Assistant Secretary for Preparedness and Response.
  • Assess Attack to Determine if there is a Breach – Evaluate the incident to determine whether there is a breach of electronic Protected Health Information (ePHI).
    • If yes, report to the affected individuals within 60 days from the breach incident. In the event that the breach affects more than 500 individuals, report to HHS OCR and the media within 60 days of the occurrence (preferably as soon as possible). And if the breach affects less than 500 individuals, your organization must report to HHS OCR no later than 60 days after the end of the calendar year.
    • If no, your organization must document and retain all information considered during the risk analysis of the cyber-attack. This includes how you determined the incident was not considered a breach.

Make sure you and your team understand this infographic

This describes what to do once your organization has experienced a cyber-attack. The smart step is to prepare for a ransomware attack or cyber-related security incident. Daily backups of your data are the key step in preparing against attacks. Remember not to assume your organization is too small. Hackers target small companies because they are less likely to be prepared, can’t afford interruptions in their business, and are willing to pay the ransom demanded in order to make the problem go away.

What to Do if you suspect a Cyber attack on PHI

Total HIPAA specializes in HIPAA compliance services, helping businesses adhere to HIPAA guidelines and protect sensitive data. Our experts ensure your organization remains compliant with HIPAA regulations, meaning you can focus on your core operations while we handle documenting the policies and procedures that make up your HIPAA compliance plan. Trust Total HIPAA for comprehensive compliance solutions tailored to your needs. Book a clarity call today.

HIPAA Talk

Most people know the HIPAA Law applies to healthcare providers (hospitals, doctors, dentists, ophthalmologists). Fewer people realize that HIPAA also applies to health insurance agents, employers who offer health benefits to their employees, and to business associates (shredding companies, IT vendors, etc.) who can access an individual’s Protected Health Information.

What Happens if an Agency is Responsible for a Breach?

In the latest episode of HIPAA Talk, Jason Karn, Total HIPAA’s chief compliance officer interviews David C. Smith, nationally recognized HIPAA consultant to discuss what the recommended steps are to properly handle a breach of information by your agency.

Podcast Button

RELATED CONTENT

Watch the 2023 Webinar: HIPAA Violations in the Real World

HIPAA violations in the real world webinar recording

Case Study- Hook, Line, and Sinker: Falling for a Phishing Scam

5 HIPAA Lessons From the Anthem Cyber Attack

REFERENCES

  1. https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/index.html
  2. https://www.hhs.gov/sites/default/files/cyber-attack-checklist-06-2017.pdf
  3. https://www.hhs.gov/sites/default/files/cyber-attack-quick-response-infographic.gif

Sharing is caring!

Documents

Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.

Download Now

Let's keep in touch

Stay up to date on the latest HIPAA news, plus receive tons of free tools and info.

Navigating HIPAA Compliance in 2023

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!

Document

Related Posts

What is Access Control in terms of HIPAA?

What is Access Control in terms of HIPAA?

Access control, in terms of cybersecurity, refers to the practice of managing and regulating who can access specific resources, systems, or data within an organization's network or information...

Comparing HIPAA and NIST

Comparing HIPAA and NIST

In the ever-evolving landscape of data security and privacy, two key frameworks have emerged as significant players: HIPAA and NIST. Both emphasize the importance of safeguarding sensitive...

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)