Small Medical Practices and Cyber Attacks

Recently one of our good friends and healthcare blogger, John Lynn of EMR & HIPAA wrote a blog on why small medical practices are at great risk for a cyber attack and we couldn’t agree more. Too often small medical practices operate day to day with the notion they are too insignificant to suffer a malware attack or security breach. Not only does that way of thinking put the reputation of the practice in jeopardy, it also compromises patient security. The truth is, smaller medical practices are just as vulnerable (if not more) as larger practices or hospitals.

To read John’s blog, visit: http://www.emrandhipaa.com/emr-and-hipaa/2017/06/14/why-small-medical-practices-are-at-great-risk-for-a-cyber-attack/

Regardless of limited resources, there are multiple ways practices can protect themselves against a multitude of hacking threats, including:

  • Encryption
  • Firewalls
  • Penetration Testing
  • Compromise Assessment
  • Workforce Training
Despite this info-graphic showcasing EHR vulnerabilities, we think it could just as easily be applied to small practices:

Updates to our Microsoft Windows 10 Whitepaper

In February, we released a whitepaper co-authored with Microsoft which reviewed how Windows 10 can be used as a compliant operating system for healthcare organizations. If your workplace uses and/or plans to upgrade to Windows 10 Enterprise and … [Continue reading]

Penetration Testing & Patient Portals

As healthcare providers continue to embrace technology, are patients being left vulnerable? If a recent incident at a Frisco, TX-based healthcare services company, True Health Diagnostics is any indication, then the answer is a resounding “yes.” PHI … [Continue reading]

What Does Real Audit Preparedness Look Like?

Link to our recent press release: http://bit.ly/2qfTMgI For many members of the healthcare community, the word “audits” was overheard more than a few times last year. In March 2016, Health and Human Services’ Office for Civil Rights (OCR) … [Continue reading]

Need to Access the LADMF? We can help!

In the world of HIPAA compliance, sometimes the only constant is change. It is not out of the norm for one of our clients to come to us with a question or request that at times, takes us by surprise.  This occurred recently when a client contacted us … [Continue reading]

Removing Extra Clicks and Saving You Time

Today, healthcare is bloated with administrative processes and complex regulations. At HIPAA One, we are passionate about disrupting this trend by striving to keep our Security Risk Analysis (SRA) tool as simple as possible. We take our user's … [Continue reading]

Man-in-the-Middle Attacks

In their April Cybersecurity Newsletter, Office for Civil Rights (OCR) addressed an emerging threat known as “Man-in-the-Middle” (MITM) attacks. A MITM attack occurs when a third party secretly intercepts and relays the message between two parties … [Continue reading]

What is HR’s Role in HIPAA Compliance?

In recent years, many healthcare organizations have faced the same question: Which department should be tasked with Health Insurance Portability and Accountability Act (HIPAA) compliance? More times than not, the finger points to IT. However, in … [Continue reading]

OCR Provides Guidance for Reporting and Monitoring Cyber Threats

The U.S. healthcare community has endured a seemingly constant string of data breaches and cyber threats in recent years. Unfortunately, cyber attacks show no indication of slowing down and most likely, will increase in number and severity for the … [Continue reading]

Debunking the Myth: Is Windows 10 HIPAA Compliant?

We’ve collaborated with Microsoft on a new whitepaper and we want you to be one of the first to receive a copy. Our whitepaper, HIPAA Compliance with Microsoft Windows 10 Enterprise, provides guidance on how to leverage Microsoft Windows 10 as … [Continue reading]