2018 Safety Awareness Training Statistics

December 13, 2018

Dec 14, 2018   A new survey carried out by Mimecast has produced some fascinating safety mindfulness training figures for 2018. The survey indicates many companies are taking substantial risks by not providing sufficient training to their workers on cybersecurity. Question the IT division what is the greatest cybersecurity risk and several will say end users. IT teams put a substantial amount of effort into applying and maintaining cybersecurity defenses, only for workers to take actions that introduce malware or lead to an electronic mail breach. It is understandable that they are frustrated with workers. Most cyberattacks begin with end users. By compromising one appliance, an attacker gains a footing in the network which can be used as a Launchpad Read More

Central Colorado Dermatology Ransomware Attack Possibly Led to PHI Access

November 23, 2018

August 23, 2018   Central Colorado Dermatology (CCD) has informed over 4,000 patients that some of their protected health information (PHI) has possibly been retrieved by hackers during a ransomware attack on its computer system. An illegal person gained access to CCD’s computer system and deployed ransomware on a server. Medical files and patients’ medical charts were not retrieved, even though certain files and scanned fax communications were encrypted. Some of those files had PHI. An inquiry was initiated to decide whether protected health information was retrieved or stolen even though it was not possible to decide with a high level of confidence whether any PHI was seen or copied. CCD didn’t disclose any proof to indicate that PHI had Read More

U.S. Military Data Thieved as a Consequence of the Failure to Alter Default FTP Passwords

September 24, 2018

July 13, 2018   U.S. army computers have been retrieved by a hacker and confidential army documents have been thieved and recorded for sale on online hacking forums. The U.S. security breach was made possible because of a simple mistake – the failure to alter the default FTP password on a Netgear router. Cybersecurity company Recorded Future found out concerning the documents being sold online, which contain maintenance course e-books describing how MQ-9 reaper drones must be repaired, information on usual deployment strategies for IEDs, a manual for an M1 ABRAMS tank, a document that contains tank platoon strategies, and crewman and subsistence training handbooks. Astonishingly, given the secret nature of the material, the hacker is vending the data for Read More

OCR Declares $4.3 Million Civil Monetary Fine for University of Texas MD Anderson Cancer Center

August 19, 2018

June 21, 2018   The Division of Health and Human Services’ Office for Civil Rights has declared its fourth biggest HIPAA violation fine has been issued to The University of Texas MD Anderson Cancer Center (MD Anderson). MD Anderson has been directed to pay $4,348,000 in civil monetary fines to decide the HIPAA violations connected to three data breaches faced in 2012 and 2013. MD Anderson is an educational institute and a cancer cure and research center situated at the Texas Medical Center in Houston, TX. After the submission of three breach accounts in 2012 and 2013, OCR started an inquiry to decide whether the breaches were caused as a consequence of MD Anderson having failed to abide by HIPAA Laws. Read More

Integrated Rehab Experts Takes 16 Months to Inform Patients of PHI Breach

June 19, 2018

April 26, 2018   The information – which included patients’ complete names, treatment location, procedure code, treatment visit ID, admission date, visit date, visit status, gender, address, date of birth, medical provider details, and diagnosis codes – had been published to an openly accessible source. The PHI was found by a healthcare safety scientist who warned IRC regarding the data breach. Swift action was taken to remove and protect the data and an inquiry was kicked off to decide how and why the data had been made available to an unsafe place. That review decided that a business partner who had been given the PHI had revealed the PHI to a third party. It was that subcontractor that made the blunder Read More

Western Washington Medical Group Patients Revealed Because of HIPAA Breach

May 25, 2018

842 patients of Western Washington Medical Group have had their PHI revealed when records including confidential health info were disposed of with usual garbage in November 2017. The breach happened when the janitorial facility used by the medical group took out the substances from shredding baskets together with usual garbage. As opposed to confidential documents being lastingly fired in accordance with HIPAA Laws, they were taken away in usual garbage baskets. Western Washington Medical Group workforce noticed the error the following day, however too late to rectify the position and retrieve the records because the garbage had already been taken away to landfill locations for extinction. The breach might have been only trivial, however, those affected have had a variety of Read More

Research Indicates Healthcare Data Breaches Cause 2,100 Demises a Year

March 29, 2018

A scientist at Vanderbilt University has carried out an analysis that indicates death rates at hospices rise after a data breach as a consequence of a decline in the level of treatment. The scientist guesses healthcare data breaches might cause as many as 2,100 demises a year in the U.S. The analysis was carried out by Owen Graduate School of Management scientist, Dr. Sung Choi. The results of the analysis were shown at a latest cyber risk quantification seminar at Philadelphia’s Drexel University LeBow College of Business. Cyber attacks can directly affect patient care, which has been clearly emphasized on many events over the last year. Ransomware as well as wiper malevolent program attacks have paralyzed information systems as well Read More

Liquid Web and HIPAA Compliance

March 25, 2018

Healthcare companies looking for a hosting solution might find Liquid Web as a likely seller, however, is Liquid Web HIPAA compliant? Can its cloud administration facilities be utilized by HIPAA-protected organizations for introducing apps and jobs that contain electronically safeguarded health files? Any healthcare company that desires to utilize the cloud to introduce apps that utilize the protected health information (PHI) of patients should select a seller whose facility contains safety measures to make sure the integrity, secrecy, and availability of ePHI that satisfy the necessities of the HIPAA Safety Law. Cloud service providers, including hosting companies, are categorized as BAs because they probably have access to their customers’ information. Although several cloud facility suppliers consider they don’t access clients’ Read More

Western Washington Medical Group Patients Revealed Because of HIPAA Breach

March 3, 2018

842 patients of Western Washington Medical Group have had their PHI revealed when records including confidential health info were disposed of with usual garbage in November 2017. The breach happened when the janitorial facility used by the medical group took out the substances from shredding baskets together with usual garbage. As opposed to confidential documents being lastingly fired in accordance with HIPAA Laws, they were taken away in usual garbage baskets. Western Washington Medical Group workforce noticed the error the following day, however too late to rectify the position and retrieve the records because the garbage had already been taken away to landfill locations for extinction. The breach might have been only trivial, however, those affected have had a variety of Read More

Zoom Video Conferencing and HIPAA Compliance

February 26, 2018

More than 750,000 companies are now utilizing Zoom for online video as well as web conferencing. Nevertheless, before applying for the use of the facility it’s crucial to consider if it complies with HIPAA Rules for proper use by healthcare companies in relation to distributing PHI. A cloud-built web and video conferencing program, Zoom lets workers across several places to take part in conferences, share files, as well as cooperate. The web device supports webinars and includes a business IM facility. Zoom has already been set up by several healthcare companies worldwide who utilize the program to interrelate with other suppliers and to be in touch with patients. Nevertheless, in the USA, healthcare companies should comply with HIPAA Rules. Any software Read More

HIPAA Compliance and eFileCabinet

February 25, 2018

Like a document administration as well as a storage facility for companies, eFileCabinet offers on-site as well as cloud storage. Nevertheless, is the facility suitable for the healthcare industry? Does eFileCabinet abide by HIPAA laws or will using its result in HIPAA breaches? Document management facilities allow organizations to carefully administer electronic papers and stock them securely in one location. With big sizes of documents being generated, such computer networks take the pressure out of document administration and can let HIPAA protected organizations share papers including ePHI securely and evade HIPAA breaches. It’s vital to keep in mind that there are many document administration facilities available now, however, not all abide by HIPAA. Safety measures contain the encryption of data at rest and on Read More

MediaPro Informs Low Grades on Healthcare Division Safety Consciousness

February 24, 2018

A latest MediaPro report announced there’s still a lack of willingness to cope with usual cyberattacks and secrecy and safety risks are still not completely understood by healthcare workforce. In MediaPro’s 2017 State of Secrecy and Safety Consciousness Report, the company asked 1,009 US healthcare division workforce to evaluate their level of safety consciousness. Respondents were questioned about usual secrecy and safety dangers and were questioned to give replies to several different threat situations to decide how they would react to real-world risks. Studying the replies, MediaPro labeled respondents to one of 3 sets. Heroes were those who achieved highly and demonstrated a detailed knowledge of secrecy and safety dangers by replying 93.5%-100% of queries properly. Rookies demonstrated a sensible Read More