Most Popular HIPAA Topics This Year
December 10, 2018
Here at Total HIPAA, we pride ourselves on providing many helpful resources for all businesses striving for HIPAA compliance. Our weekly blog is one of the many services we offer. As we approach the end of 2018, we reflect on the most popular HIPAA topics this year. Our analytics tell us these were the most visited pages posted on our website in 2018.
Top 10 Most Popular HIPAA Topics This Year:
HIPAA requires you to complete a Risk Assessment (often referred to as a Risk Analysis) as part of your compliance plan. This document identifies possible company vulnerabilities that could result in a breach. If your organization is audited, you will be required to provide your RA. Read more >
Data breaches generated through emails are the primary channel hackers use to access your company’s data. Hackers pose as a reputable entity and send an email or text message to their target(s) asking for login credentials. Then, they use this information to enter a database or account. Phishing can take many forms, with each becoming more and more difficult to detect. Read More >
According to security experts, these are the five cyber attack types you’re most likely to face. These include socially engineered malware, password phishing attacks, unpatched software, social media threats, and advanced persistent attacks. With so much of our sensitive data stored online, it’s no surprise that cybercrime is on the rise. Data breaches have long been a problem for businesses and individuals, but criminals are increasingly ramping up attacks and using tricky new methods to access data. Read More >
You must log every breach immediately, even if it involves fewer than 500 individuals. There are two time frames in which you may report these breaches. You can report small breaches throughout the year as they occur. Alternatively, you may report these breaches to the Secretary of HHS within 60 days after the end of the year. If you choose to report during this period, you must record the details of the breaches as they occur. Every breach needs to be included regardless of how minor the incident or how few individuals are involved. Read More >
If a covered entity or business associate does not comply with HIPAA, Health and Human Services (HHS) Office for Civil Rights (OCR) determines the punitive measures for the entity at fault. And remember, the same requirements for covered entities apply to business associates and their subcontractors. State attorneys general can also impose fines for HIPAA violations. Read More >
By the summer of 2018, Health and Human Service’s Office for Civil Rights (HHS OCR) received more than 160 reports of HIPAA-related breaches affecting over 500 individuals. HHS investigated all organizations, and many received severe fines and other penalties. Where did they go wrong? This post takes a closer look at how these recent HIPAA breaches add up, and how you can avoid being the next statistic. Read More >
What’s the easiest way to ensure your data is HIPAA compliant? For many businesses, a Virtual Private Network (VPN) is one of the most effective ways to implement network security, protect data transmission, provide encryption, and meet other compliance requirements that secure electronic Protected Health Information (ePHI). Read More >
HIPAA law mandates that Covered Entities, Business Associates, and Business Associate Subcontractors protect the PHI they store and come in contact with at rest, in storage, and in transit. Technology has changed the way we do business today – safeguarding PHI in every form is crucial. Email encryption is just another way to protect it and your organization. In this blog, we review looking at eight affordable vendors for small to midsize organizations. Read More >
We are storing more information online than ever before. The average Internet user has at least 90 online accounts, and within 3 years, researchers estimate the number may triple! How can you be sure you’re keeping your electronic information safe? Password managers are excellent tools for keeping all accounts and profiles secure, so ePHI is less likely to be compromised. We review several services, some of which our company uses, in this blog. Read More >
In the last 10 years, the number of people telecommuting in the U.S. has increased by a staggering 115 percent. While there are undeniably several advantages of working remotely, there’s also a monstrous risk for those obligated to comply with HIPAA. Keeping clients’ protected health information (PHI) safe becomes more complicated outside of the office. Health and Human Services Office for Civil Rights (HHS OCR) has levied hefty financial penalties when entities have failed to properly oversee and manage their telecommuters’ access and protection of PHI. Read More >
If you have ideas for topics you would like us to address in 2019, please tweet us or send your suggestion to info@TotalHIPAA.com. Considering the ever-evolving advancements in technology, we predict many of 2019’s most popular HIPAA topics will revolve around cybersecurity and proper handling of electronic devices. Whatever happens, we look forward to providing more posts to help you stay HIPAA compliant.