


Update: Increase in Estimated Cost of a HIPAA Breach
With Phase 2 of HIPAA audits in full swing, many companies are worried about potential fines and penalties from the Office of Civil Rights (OCR). However, the cost of a breach can cost a lot more than any fines from OCR. The easiest way to avoid the financial impact...
How HIPAA Can Help Deter Hackers
The number of hacks and breaches that occur continues to rise exponentially. Though you may have security measures in place, hackers are finding new ways to infiltrate your system. So, what can you do to stay one step ahead of the hackers? A 2015 Reader’s Digest...
Covered Entities Must Share PHI with Patients Even in an Unencrypted Format
This month, Atlantic Information Services reported that covered entities must provide patients with their ePHI when they request it, in a format that the patient can open on their computer. Does this mean Covered Entities may have to send unencrypted emails containing...
Update: HIPAA Compliant File Sharing
There is an updated file sharing review blog here. File sharing is a critical tool used by businesses and practices to easily store, share, control, and protect important files in the cloud. These applications are indispensable to businesses and individuals that...