


How to Handle Subcontractors Under HIPAA
There are many scenarios in business and healthcare in which PHI is moved and shared. In the 1990s a lot of this happened over fax machines, over the phone and in person. In the modern landscape software and the internet are used to manage all data including protected...
Preserving Patient Confidentiality: Prioritizing Security in Healthcare Facilities
Security is crucial for hospitals and doctors’ offices to protect sensitive patient information. In this blog post, we’ll explore the significance of physical and network security. The Impact of Physical Security Imagine walking into a clean and...Navigating New Horizons: 2023 HIPAA Rule Changes and PHI
HIPAA (Health Insurance Portability and Accountability Act) has evolved over the years to adapt to advancements in healthcare and technology. The 2013 HIPAA Omnibus Final Rule expanded its scope, and now the HIPAA Privacy Rule is set to change again in 2023. This...
Case Study- Hook, Line, and Sinker: Falling for a Phishing Scam
A HIPAA Prime client emailed and called us on a Tuesday afternoon to let us know that earlier that day their email had been hacked and a phishing email was sent out to over 1,000 contacts that included clients. The Total HIPAA Compliance Team immediately called...