In early September 2018, three Boston hospitals, Brigham Women’s Hospital, Boston Medical Center, and Massachusetts General Hospital, collectively paid $999,000 in a settlement for potential HIPAA violations. The fines were imposed by the Department of Health and...
HIPAA Rules require that your organization provide training to employees on privacy and security awareness. Employees should know about the law as well as your organization’s specific policies and procedures. Reminding employees of rules and regulations through HIPAA...
American businesses have used fax machines to transmit images via telephone lines since the late 1980s. Now, almost forty years later, many organizations are still relying on these workhorses to do business. As of 2015, about 46.3 million fax machines were still in...
Jason Karn, Chief Compliance Officer at Total HIPAA, recently discussed the importance of a VPN for groups that need to be HIPAA compliant with Karen Mesoznik, Head of Marketing Communications and PR, for Perimeter 81. Jason and Karen discuss: How a VPN can protect...
If you had to guess how many Americans use a smartphone, what would your answer be? If it seems to you like they’re everywhere, you’re right! Here’s proof that we’ve officially embraced the mobile technology revolution — As of January 2017, about three-quarters...
What better time to exploit the kindness of well-meaning people who want to help victims than during natural disasters? Cybercriminals are waiting in the wings to take your money or steal sensitive information. After events like the California wildfires or hurricanes...
The threat of compromised business email spans across all industries. From healthcare to manufacturing – both large and small – from coast to coast –organizations are struggling to stave off increasingly sophisticated cyber threats. Criminals are using techniques like...
Healthcare providers, health insurance agents, employers that provide health benefits, and business associates that see Protected Health Information must implement HIPAA compliance. The technical portion of the required HIPAA risk assessment, which is part of the...
This week, we break down Aetna’s new broker encryption requirement. Read on to learn all you need to know about this new rule. Can you name the five types of cyber-attacks you are most likely to face? Socially engineered malwarePassword phishing...
Remember hearing about Spectre and Meltdown in late 2017? They were the software flaws that affected almost all 2008 and newer processors, affecting millions of devices. The flaws themselves were in the processor chips, which allowed hackers to gain access to parts of...
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back
Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)
Free Business Associate Agreement (BAA) Download
BAA Download
Thank you for completing this questionnaire. Please check your email for your results.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok