In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading
Buckle up for Part 2 of our breakdown on the HHS OCR NIST healthcare security conference - because, yes, 16 hours of deep dives into AI, HIPAA compliance, and cybersecurity priorities can’t be tackled in just one episode! From wild projections about AI’s future in healthcare to OCR’s “tough love” on compliance standards, this episode peels back the…
…
continue reading
Buckle up, folks! Today, Donna and David are here with Part 1 of their deep dive into the recent HHS OCR NIST healthcare security virtual conference, and they're spilling all the cyber-tea. With experts from HHS, OCR, NIST, FTC, and FDA presenting, this conference covered a ton. From AI-powered hackers and QR code scams to unpatched medical devices…
…
continue reading
Ever heard someone say you need a pen test but then start wondering if they meant a pen from a spy movie? There typically is a lot of confusion between penetration testing and vulnerability assessments—a common mix-up with big consequences for your cybersecurity game. We will walk through different types of pen tests, explain how they help you spot…
…
continue reading
1
Gumming Up the Works: Dental Record Request Nightmare - Ep 481
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24
Ever had a root canal that felt less painful than dealing with bureaucracy? Well, buckle up, because in this episode, we sink our teeth into the 50th patient right of access enforcement action under HIPAA. That’s right—50 cases since 2019, and somehow, this one involving Dr. Gumb (yes, really) and a dental records dispute is the most absurd of the …
…
continue reading
1
Ransomware, Recall, and Regulations - Ep 480
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27
Today we tackle the trifecta of cybersecurity headaches: Microsoft’s awkwardly ambitious recall feature, the looming HISAA regulations (because HIPAA wasn’t enough), and a juicy enforcement action following a ransomware attack. We’ll break down how Microsoft’s recall reboot went from intrusive default to opt-in relief, why HISAA could mean mandator…
…
continue reading
Leaving your web browser open with 25 tabs is the digital version of leaving your front door unlocked? Whether it's for email, work docs, shopping, or watching cat videos, your browser is the gateway to, well, everything. But as much as we depend on them, so do hackers. From credential theft to sneaky phishing attacks, cybercriminals are finding cl…
…
continue reading
Boo! 🎃 Halloween may not be here yet, but we’re kicking off the spooky vibes early! Donna and David dive into the eerie world of cybersecurity, where the tricks are plentiful, and the treats are hard to find. From scary ransomware attacks to the horrifying reality of business email compromises, the internet is scarier than a haunted house with no e…
…
continue reading
1
Avoid These 5 Healthcare Marketing Mistakes - Ep 477
52:45
52:45
Play later
Play later
Lists
Like
Liked
52:45
Healthcare marketing is tricky enough without tripping over the big pitfalls that could leave you tangled up in HIPAA violations or a patient privacy disaster. Today we break down five common marketing mistakes you definitely want to steer clear of. From misinterpreting HIPAA rules to guarding patient data like it’s your grandma’s secret cookie rec…
…
continue reading
Do you feel like cyberattacks are the world’s worst game of whack-a-mole? No matter how many you smack down, ten more pop up— and there’s no sign of it slowing anytime soon and neither is the confusion over who’s responsible when your data gets caught in the crossfire. If your supply chain and your own security safeguards aren't locked down, you mi…
…
continue reading
1
Check Your Facility Access Controls - Ep 475
52:11
52:11
Play later
Play later
Lists
Like
Liked
52:11
Ever left your front door unlocked, thinking it’s no big deal? Well, that’s what happens when you forget about facility access controls – and the consequences can be far worse than a missing TV! Today, we dive deep into a topic that often gets overlooked but is critical to any organization’s security – facility access controls. Whether it's ensurin…
…
continue reading
It's that time of year again: Cybersecurity Awareness Month! We're diving into the world of cybersecurity like a hacker in a candy store—except we're here to keep the candy (your data) safe! We're breaking down how you can use the free CE Awareness Month toolkit to boost your cybersecurity game both in your business and at home. Whether you're an I…
…
continue reading
Navigating the world of cybersecurity these days feels like walking through a minefield with clown shoes—are you stepping safely or just a step away from disaster? In this episode, we dive into the jaw-dropping National Public Data breach that's got everyone asking, "Am I a victim too?" Spoiler alert: the odds aren't in your favor. Then, we sift th…
…
continue reading
In this episode, we're diving deep into the world of Software Bill of Materials (SBOM)—basically, the recipe for your software, minus the secret sauce. If you've ever wondered what's really under the hood of your favorite apps (or been caught off guard by a sneaky ingredient), this one's for you. We’re breaking down why you should care about SBOMs,…
…
continue reading
Navigating healthcare cybersecurity is like walking through a minefield—you never know which step could trigger the next explosion. In this episode, we’re diving headfirst into the bloody mess of ransomware attacks that have turned hospitals and blood banks into a logistical nightmare. Amidst the chaos, Health-ISAC and the American Hospital Associa…
…
continue reading
1
How Well Do You Know Remote Workers? - Ep 470
42:10
42:10
Play later
Play later
Lists
Like
Liked
42:10
How well do you really know your remote workers? With remote work increasingly becoming the norm, the complexities of securing devices and monitoring access have skyrocketed. The challenges of providing robust security measures for an increasingly dispersed workforce are immense. Real-world examples like the KnowBe4 incident, where a remote worker …
…
continue reading
Ever had one of those days where everything just seems to crash and burn? Well, in this episode, we dive into a tech catastrophe that sent ripples across the digital landscape. Donna and David will unravel the chaos caused by CrowdStrike's major tech outage—a meltdown that wasn’t just an ordinary hiccup, but a vendor-of-a-vendor fiasco. From blue s…
…
continue reading
Ever wondered how neglecting a cybersecurity risk analysis is like leaving your front door wide open in a sketchy neighborhood? Well, buckle up because today we dig into the latest OCR ransomware settlement involving Heritage Valley Health Systems and a laundry list of potential violations. From failing to conduct a thorough risk analysis to lackin…
…
continue reading
1
Just Because You Can Does NOT Mean You Should - Ep 467
46:01
46:01
Play later
Play later
Lists
Like
Liked
46:01
In the HIPAA world, just because you can, doesn't mean you should – unless you’re keen on trading your business casual for prison orange. No one expects that a HIPAA violation will send them to jail, but there can be serious criminal penalties associated with HIPAA breaches, ranging from fines to imprisonment. Today, we will share real-life example…
…
continue reading
How can small and medium businesses (SMBs) tackle the complexities of single sign-on (SSO) and boost their password security? A recent study from CISA highlighted the lag in SSO adoption among SMBs and why basic security measures like SSO and multi-factor authentication (MFA) should be standard. Join us as we navigate through the maze of managing m…
…
continue reading
Ever wonder why staying vigilant in cybersecurity is like playing whack-a-mole? Let's dive into some wild stories that highlight the need to always be on the lookout! From hackers using legitimate websites to spread malware, to the humorous and slightly terrifying saga of employees using mouse jigglers to fake work, to cyberattacks from space, ther…
…
continue reading
What happens when healthcare giants falter in the face of cyber threats? Today, we dive into the critical need for better cybersecurity investments, continuous training and education and robust cybersecurity standards. We will explore the fallout from UHG’s cyber incident and break down three fiery letters from Congress demanding accountability and…
…
continue reading
1
Will Your Response Plan Work Without Internet? - Ep 463
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15
Today, we're diving into a topic that might keep you up at night and might make you reconsider your relationship with your Wi-Fi router. Picture this: your internet goes down, and it's not just a blip—it's a full-blown blackout. We're talking no Netflix, no Zoom meetings, and definitely no online shopping. We’ll unravel the chaos that ensues and di…
…
continue reading
1
7 Crucial Steps to a Comprehensive SRA - Ep 462
1:01:29
1:01:29
Play later
Play later
Lists
Like
Liked
1:01:29
Join us as we debunked some common myths about what Security Risk Analysis isn't and then cruise through the seven essential steps to conduct a complete and thorough SRA for any organization. It’s not just a one-off IT review or a checkbox on compliance forms—it’s an ongoing, dynamic process. From identifying what you need to protect to managing ho…
…
continue reading
Today we dive into the world of compulsive clickers—the folks who just can't help but tap on every tantalizing link that winks at them from their inbox. It's not just a harmless habit; these clicks can lead to some pretty sketchy places. Imagine a world where every click could be a potential minefield, threatening your digital safety with every tap…
…
continue reading
1
Battling Cyber Threats and Burnout - Ep 460
59:09
59:09
Play later
Play later
Lists
Like
Liked
59:09
Imagine juggling the intense world of cybersecurity where you're constantly putting out digital fires, with trying to keep your own mental batteries charged. It's like being a superhero who also needs to take some me-time. Our discussion dives into how we can manage the high-stakes of cybersecurity and stress-packed jobs while also making sure we d…
…
continue reading
It is time to review the annual Verizon Data Breach Investigaton report. First, we will hit the big notes from their summary. Then, we can add in a few tidbits from the bigger report details. We'll break down key statistics, discuss emerging threats, and offer insights into what these findings mean for the health sector and HIPAA privacy and securi…
…
continue reading
After the big cyberattack on Change Healthcare, there’s a hot debate about making Multi-Factor Authentication (MFA) a must-have for all public access points. With Congress getting involved and experts pushing for tougher security, it’s clear that better safeguards are needed to keep our healthcare data safe. This shift towards mandatory security me…
…
continue reading
1
Who pays for breach notifications? - Ep 457
56:21
56:21
Play later
Play later
Lists
Like
Liked
56:21
Who's on the hook for breach notifications in healthcare? Recent cybersecurity incidents like the massive Change Healthcare data breach have left providers scrambling and seeking clarity. The tangled relationships between Covered Entities and Business Associates make it tricky to figure out who's liable, especially when cyber incidents ripple down …
…
continue reading
1
Change is Gonna Make Change Happen - Ep 456
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12
The U.S. healthcare sector is facing significant changes with new HIPAA rules boosting privacy protections, particularly for reproductive health. At the same time, the industry is tackling serious cybersecurity issues highlighted by a major ransomware attack on Change Healthcare. This dual focus on strengthening legal compliance and enhancing data …
…
continue reading
1
AI Plus Small Business Cybersecurity - Ep 455
57:56
57:56
Play later
Play later
Lists
Like
Liked
57:56
In the world of cybersecurity, small businesses have their own set of unique challenges. As AI technology becomes more common, using AI in cybersecurity sounds promising, but it's crucial to handle it wisely to avoid new risks. These tools are powerful, but they need to be used carefully because they can also open up new kinds of cyber threats. Sma…
…
continue reading
1
Attackers Enjoy Sweet Fruit of Patience - Ep 454
50:21
50:21
Play later
Play later
Lists
Like
Liked
50:21
Aristotle once said, “Patience is bitter, but its fruit is sweet.” That's totally spot on when you think about cybersecurity threats and how sneaky cybercriminals can be. These attackers plant their harmful seeds and just hang back, waiting for the right time to take advantage of old weaknesses. Their patience and careful planning mean they can str…
…
continue reading
One Friday night in September last year, a massive hack at the MGM Grand caused quite a stir in Las Vegas. Cybercriminals used tricky tactics to slip through the cracks, infiltrating the network, and disrupting services at the hotel and casino. It's a wake-up call for everyone to step up their security game and stay one step ahead in this fast-chan…
…
continue reading
MSPs are like the backstage crew for your business's IT show, handling everything from network management to cybersecurity. But here's the kicker: while they're busy protecting you, they've got to make sure they're not accidentally opening the back door for trouble with their own tools and business practices in the process of delivering their servi…
…
continue reading
1
Vendors Surprised By Vetting - Ep 451
1:01:33
1:01:33
Play later
Play later
Lists
Like
Liked
1:01:33
In an increasingly interconnected and data-driven world, the importance of rigorous vendor vetting cannot be overstressed. Vendors ticking a box saying that they use a framework for data security and compliance isn’t enough anymore. It is a critical due diligence process that helps clients build secure, compliant, and mutually beneficial business r…
…
continue reading
As Change Healthcare ransomware attack unfolds, concerns are escalating regarding patient care and safety, pushing the Healthcare Sector Coordinating Council's (HSCC) 5 Year Strategic Plan into the spotlight. Donna and David talk with Gary Salman, CEO of Black Talon Security, on the ongoing situation, what is known and unknown, and its potential lo…
…
continue reading
For more than a decade, Donna has immersed herself in the plethora of sessions from the National HIPAA Summit, extracting a wealth of insights into the present and future landscape of HIPAA. Today, she will impart her top three takeaways from this year’s Summit, essential knowledge for navigating the road ahead. Buckle up folks, because these insig…
…
continue reading
1
Critical to Stable Condition in 5 Years - Ep 448
1:01:22
1:01:22
Play later
Play later
Lists
Like
Liked
1:01:22
Healthcare is inherently about trust; trust between patients and providers, trust in the efficacy of treatments, and increasingly, trust in the technology that underpins modern medicine. However, this trust is under siege by an evolving landscape of cyber threats. Today, we tackle the critical status of healthcare cybersecurity and the concerted ef…
…
continue reading
1
NIST, Moobot, Ransomware AI Impact - Ep 447
1:03:21
1:03:21
Play later
Play later
Lists
Like
Liked
1:03:21
The rapid advancement of AI could soon eclipse our understanding, with its capability to predict and even manipulate human behavior. Today, we will dive into how AI is reshaping our understanding and preparedness for the digital threats lurking around the corner. Plus, NIST just released guidance that can be used to help improve the healthcare sect…
…
continue reading
1
Insider Breach Gets Huge OCR Settlement - Ep 446
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01
OCR recently announced a jaw-dropping settlement that should have every healthcare professional on high alert. An insider breach that had staggering repercussions, leading to a monumental $4,750,000 settlement and a two year CAP. HHS has also released new cybersecurity resources and guidance and more is to come. There is no excuse anymore folks. Cy…
…
continue reading
1
Cyber Insurance Trends with John Miller - Ep 445
56:16
56:16
Play later
Play later
Lists
Like
Liked
56:16
Imagine your cybersecurity measures as the immune system of your body. Just like our bodies are constantly exposed to germs and viruses, your business is exposed to a barrage of cyber threats. Cyber insurance is like health insurance for your company's digital health. We are joined today by John Miller of Sterling Seacrest Pritchard, exploring the …
…
continue reading
1
New HPH Sector Cyber Performance Goals Released - Ep 444
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40
HHS has adapted CISA’s Cybersecurity Performance Goals, released in March 2023, for healthcare entities to better protect those in the healthcare sector from cyberattacks. These voluntary goals aim to strengthen cyber preparedness, improve cyber resiliency, and protect patient health information and safety. In this episode, we will review the HPH C…
…
continue reading
1
Small Business Cybersecurity 2024 - Ep 443
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:16
It’s no secret that small businesses face challenges in understanding and keeping up with the rapidly changing cyber threat landscape. Today we’ll discuss some of those challenges and review new free resources from NIST and CISA coming out in 2024 that can help SMBs manage and improve their cybersecurity programs. Buckle up, it’s going to be a busy…
…
continue reading
1
New NY State AG HIPAA Enforcement - Ep 442
57:23
57:23
Play later
Play later
Lists
Like
Liked
57:23
We all know that OCR is the HHS department that oversees and enforces HIPAA to ensure the protection of individuals' healthcare information. However, more and more states around the country are also making efforts to protect their constituents’ personal information and hold companies accountable for their poor data security practices. Today, we dis…
…
continue reading
The number of ransomware attacks impacting critical services, compromising personal information and attackers requesting higher and higher ransoms continue to rise. Today, we discuss this pressing issue, implications of ransomware attacks, the ethical considerations of paying ransoms, and the urgent need for preventative measures. More info at Help…
…
continue reading
In today’s world, it's essential to recognize the importance of safeguarding your personal information. From the moment you wake up and check your smartphone to the minute you stream your favorite show or make an online purchase, your every digital move leaves a trail of data breadcrumbs. But, you have the power to take charge of your data privacy.…
…
continue reading
It’s time to recap Donna and David’s 2023 HIPAA and cybersecurity predictions and hear what their crystal ball says about what to look out for in 2024. And, since AI exploded in 2023, we asked ChatGPT for predictions for 2024 too. More info at HelpMeWithHIPAA.com/439
…
continue reading
It’s no secret that healthcare is vulnerable to cybersecurity threats and patient privacy and safety are at risk. Good news! HHS recently announced a plan to enhance cybersecurity in the healthcare and public health sectors. Through various initiatives, including 405(d) and other HHS efforts, plans are starting to come together like pieces of a puz…
…
continue reading
It's time of year again where we take some time off and let Bojan create a Help Me with HIPAA bloopers show of our mishaps and outtakes. Stick around to the end - we have a little surprise for you. Thanks to Bojan for his skill in making us sound so good every week. Thanks to all our listeners who have been with us and share our podcast with others…
…
continue reading
1
Decoding CISA's HPH Mitigation Guide - Ep 437
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25
CISA has released a mitigation guide to combat the critical and complex cyber threats affecting the Healthcare and Public Health Sector. It provides best practices, essential strategies and insights for safeguarding our healthcare infrastructure against ever-evolving cyber threats. Join us as we navigate through this important document, breaking do…
…
continue reading
1
Multi-state Cyber Attack Diverts ER Ambulances - Ep 436
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05
You know how we say that hackers love to launch attacks during the holidays because that’s when most folks are distracted and in a hurry to begin their time off? Well guess what? There are already a few cyber attacks in the news just from this past Thanksgiving. Case in point, the recent ransomware attack that diverts ER ambulance services across m…
…
continue reading