


OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates in October motivated a Covered Entity’s compliance officer to call Total HIPAA last week. He had done a Google search on what a Covered Entity should do...
Multi-Line Agencies and Privacy Requirements
It’s important to train all staff in a multi-line agency on HIPAA Compliance There is a great deal of crossover within a multi-line agencies. Cross-selling group or individual health insurance and other benefits, between personal lines and key commercial lines...
Strong Passwords – Your Employees Most Important Contribution to Network Security
Are your passwords so easy that a seven year old can figure them out? In 2012, Dropbox verified that the user information of 68 million Dropbox users was stolen. This information included both usernames and passwords. Though Dropbox was aware of this breach, there was...
Update: Disaster Recovery
In the midst of tropical storm season, we want to remind you of the importance of a Disaster Recovery Plan. The most recent storm, Hermine, has caused floods and flash flooding in many areas of the Southeastern US. Natural disasters like this are exactly why we need...
Bring Your Own Device (BYOD) Guidance
Bring Your Own Device, or BYOD, is when employers allow their employees to use their own electronic devices (phones, computers, tablets, etc.) on the organization’s network. BYOD has progressed from infrequent implementation to the norm. In 2015, Tech Pro...
HHS is Focusing in on Small Breaches
If you think HIPAA won’t be enforced for small breaches, think again. On August 18, 2016, OCR announced its intent to focus in on smaller breaches. The announcement states “Beginning this month, OCR has begun an initiative to more widely investigate the root causes of...
Update: Increase in Estimated Cost of a HIPAA Breach
With Phase 2 of HIPAA audits in full swing, many companies are worried about potential fines and penalties from the Office of Civil Rights (OCR). However, the cost of a breach can cost a lot more than any fines from OCR. The easiest way to avoid the financial impact...
How HIPAA Can Help Deter Hackers
The number of hacks and breaches that occur continues to rise exponentially. Though you may have security measures in place, hackers are finding new ways to infiltrate your system. So, what can you do to stay one step ahead of the hackers? A 2015 Reader’s Digest...