We are seeing a trend in HIPAA compliance assessment firms making claims about HIPAA compliance that simply are not true. Here are two of the increasingly common claims.
Building esthetics must not overrule physical safety, unnecessarily violate privacy, and result in what could have been preventable destruction and damage to information and IT assets.
Crooks come out of the digital woodwork and shadows when there are changes in society. With the change in the U.S. government administration, there are many concerns with government programs. In particular, a large segment of the U.S. population is expressing great concern with Social Security, and the returns on their savings investments they’ve made throughout their lives. Here are 6 tactics crooks are using to steal your Social Security benefits, or steal your personal information, by claiming to be from the Social Security Administration.
Explore the benefits and risks of AI in healthcare, with insights on how GenAI tools can improve threat detection and patient data protection, if used accurately and securely.
Celebrate HIPAA's 28th anniversary with a reflection on its impact, history, benefits, and the ongoing need for improvements in healthcare data privacy and security.
Discover essential insights into database management and security with this free excerpt from Dr. M.E. Kabay's book, The Expert in the Next Office. Learn about the risks of misconfigured databases and why security professionals should understand DB management systems.
AI is being used much more frequently, and in new and unexpected ways, to not only launch social engineering attacks, but also to facilitate many new types of cyberattacks. In addition to research I've done in this area, one of our other Privacy & Security Brainiacs team members, Noah Herold, has also done research for how AI is being used for social engineering and other cybercrime tactics.
Calls impersonating/spoofing others are becoming harder to spot as technology advances, and as artificial intelligence (AI) tools are able to audibly sound just like the legitimate person they are claiming to be. It makes it important for you (and your family, friends and customers) to keep awareness high.
We have a medium-sized hospital, with seven clinics, telehealth and mobile (including home visits) healthcare services. Different vendors are giving us conflicting information about the requirements for HIPAA physical safeguards. Some vendors have told us that physical safeguards only apply to using locks and cameras on our hospital building. Others said other things. Can you help us understand what HIPAA actually requires to meet their physical safeguard requirements?
Listen in to hear my riveting conversation with Christine Abruzzi, a cybersecurity expert with 30 years of experience, and owner of Cacapon Cyber Solutions, describing her current real-life experiences in helping a family member who is an identity theft victim.
Many types of "smart" internet-of-things (IoT) wirelessly-connected jewelry have popped up in recent years. We even answered a question about the Oura Ring, in our August issue. But, is this jewelry, meant to provide safety alerts, privacy-friendly, and cyber-secure?
Because of the complexity of the IoT products, there are many security and privacy vulnerabilities within IoT products. And so they are also a favorite target of cybercrooks, cyber snoops, and others who want to know how, when and where you're using your IoT products.
In our Privacy Professor January Tips of the Month, one of the privacy beacons we highlighted was the "Cover Your Tracks" website from the Electronic Frontier Foundation (EFF). Here are the results of our testing with this website.
Many of our Privacy & Security Brainiacs and Privacy Professor consultancy clients have asked for a simple description of the Log4j problems they've seen so much about in the news lately. Here are some key facts and advice we've provided to them.
What encryption solution businesses use? Every type of organization will typically each need to use at least two, but usually more, types of encryption solutions to meet their needs. Why? Because each organization needs to encrypt personal data, sensitive data, and a wide range of other types of regulated data, wherever the data is collected, stored, or transmitted.