Before the Ransomware Damage is Done

How a single ransomware attack destroyed a thriving medical business and how to avoid it happening to you or your clients. I was sitting at a local breakfast spot near my home in Michigan one recent morning with a friend. I was discussing my work (online training for...

The Many Forms of HIPAA Enforcement

How is HIPAA enforced? That may be a simple enough question, but it also contains more nuance than may initially be expected. Determining how HIPAA is enforced can depend upon how the term enforcement is viewed and interpreted. The first step is to define enforcement....

Does Your Breach Response Plan Include Notification?

Remain Calm, Remain Honest – and Remain in Business Avoiding the inevitable does not make it go away. Healthcare patients choose a provider based on the quality of care. In addition to that, the public will generally assume that their private information is...

A Phishing Epidemic: Constant Stream of Reports

Since at least the beginning of the summer, it seems as though no day can go by without another phishing incident being reported by a healthcare entity. The reports are almost always the same too. After some period of time (usually not the same day), unauthorized...

Unnecessary Stress: HIPAA and Litigation Requests

While many areas of HIPAA compliance result in confusion and misinterpretation, responding to document requests from parties in litigation is one that has been presenting itself frequently. The classic scenario is Party A and Party B are in a lawsuit with each other....