Lepide.com

How to Monitor PHI: What You Need to Monitor

As mentioned already, HIPAA-covered entities must maintain an audit trail of all changes made to PHI, which requires auditing changes in real-time. A real-time auditing solution will keep track of all changes to your PHI, … See more

Actived: 6 days ago

URL: https://www.lepide.com/blog/how-to-monitor-protected-health-information-phi/

How HIPAA Affects the Newest Healthcare Trends

WebIn many ways, due to the evolving use of technology in the healthcare industry, HIPAA compliance is becoming harder to meet. The advent of wearable …

Category:  Health Go Health

Healthcare Data Security: Best Practices, Common Threats, and …

WebThe main threats to healthcare data are phishing, ransomware attacks, data breaches, and DDoS attacks. Phishing is when hackers deceive someone into revealing …

Category:  Health Go Health

Understanding the HIPAA Minimum Necessary Standard

WebThe HIPAA Minimum Necessary Standard stipulates that all HIPAA-covered entities and business associates must restrict access to, and disclosure of, all protected …

Category:  Health Go Health

A Guide to Implementing the NIST Framework in Healthcare …

WebMany healthcare organizations are implementing the NIST Cybersecurity Framework (CSF), which consists of five core functions: Identify, Protect, Detect, …

Category:  Health Go Health

How to Prevent Data Breaches in the Healthcare Sector

WebIn this article we will give you some simple tips to prevent data breaches in the healthcare sector. 1. Follow information security programs. Ensure your …

Category:  Health Go Health

How to Check the Health of Active Directory

WebChecking the Health of Active Directory with the Lepide Data Security Platform . An alternative, more straightforward method of checking Active Directory …

Category:  Health Go Health

Enforcing HIPAA Might Just Be Getting Easier

WebDanny Murphy. Danny brings over 10 years’ experience in the IT industry to our Leadership team. With award winning success in leading global Pre-Sales and …

Category:  Health Go Health

Monitor the Health of Active Directory, Exchange and SQL Server

WebThe Exchange Server Health Check is an integrated component of our Lepide Data Security Platform. It’s a simple yet powerful means of keeping track of the health status of your …

Category:  Health Go Health

12 Tips for Protecting PHI

WebLikewise, PHI sent in emails will need to be encrypted. 10. Keep Antivirus and Antimalware Solutions Updated. It is essential to keep antivirus and antimalware …

Category:  Health Go Health

Most Healthcare Organizations Can’t Recover from Data Breaches

WebTo make matters worse, the frequency of healthcare breaches continues to rise. In the last 12 months, we have seen a 25% increase in the number of entities …

Category:  Health Go Health

What is HITECH Compliance and How to Meet Its Requirements

WebHITECH Compliance Best Practices. Achieving and maintaining HITECH compliance requires organizations to do a number of things. Healthcare providers should …

Category:  Health Go Health

What is Sensitive Data

WebSensitive PII refers to data such as an individual’s full name, Social Security Number, driver’s license, mailing address, credit card information, passport information, …

Category:  Health Go Health

The State of Healthcare Cyber Security in 2018

WebThe State of Healthcare Cyber Security in 2018. The healthcare industry continues to be plagued by cyber-attacks. So far in 2018, 1.4M records were breached in a phishing attack on UnityPoint Health. 38,000 patient records at were stolen from Legacy Health, and a data breach was disclosed involving 417,000 patient records from Augusta …

Category:  Health Go Health

HIPAA: The Difference Between the Privacy and Security Rules

WebAidan Simister. Having worked in the IT industry for a little over 22 years in various capacities, Aidan is a veteran in the field. Specifically, Aidan knows how to build …

Category:  Health Go Health

The 5 Biggest Cybersecurity Threats for the Healthcare Industry

WebBelow are the 5 biggest cybersecurity threats that healthcare providers need to watch out for to ensure that they are able to keep their valuable health information out …

Category:  Health Go Health

What is eDiscovery

WebE-discovery, also known as electronic discovery or eDiscovery, is the process of collecting, reviewing, and exchanging electronically stored information (ESI) for use as evidence in legal cases. This can include data from various electronic sources such as email accounts, social media, databases, websites, and more.

Category:  Health Go Health

A Guide to the Texas Medical Records Privacy Act

WebHow to Comply with TMRPA. As mentioned already, as a covered entity, you are required to deal with subject access requests in a timely manner. As such, the best …

Category:  Health Go Health

7 Reasons Why Healthcare Is A Prime Target for Cyber Criminals

WebHealthcare cyber-attacks can cause chaos. Healthcare is recognized as “national critical infrastructure”. This makes it an ideal target for malicious foreign entities, …

Category:  Health Go Health