Have you been the victim of a breach? Maybe not, but perhaps you know someone who has. Either way, deciding what to do next can be challenging if you're unprepared. First, it's important to determine whether the incident is truly a breach or simply a false alarm, then follow these guidelines to quickly respond.
HIPAA compliance is required in order to avoid large fines from the federal government, but there is another issue you can address when you implement HIPAA compliance – strengthening your practice’s network security.
Thirty billion dollars. Stacked as $100 bills, that would tower well above the weather clouds. Thirty billion dollars grabs plenty of attention. Since 2011, the U.S. Government has spent just that on Electronic Health Record incentives. In 2014, there were over 400 EHR vendors scrambling for a piece of the pie. To put it in perspective, the top five EHR companies only control 48% of the market with scores of companies rounding the majority of market share.
Editor's note: This is the third blog in a series of articles on HIPAA compliance and is produced in partnership with Total HIPAA Compliance. The second blog in this series discussed HIPAA training for your staff and can be viewed here.
Increasingly, electronic health records have the potential to make care mobile. Pulling up PACS images, analyzing labs and vitals, even computerized physician order entry can routinely be done remotely. But this more streamlined, now routine, care is only the beginning. True EHR mobility encompasses both acute and chronic care decisions, inside the hospital and outside the hospital.
Editor's note: This is the second blog in a series of articles on HIPAA compliance and is produced in partnership with Total HIPAA Compliance. The first blog in this series discussed penetration testing and can be viewed here. In the next article, we'll take a look at why staff may be your biggest threat to compliance.
You come in to work on Monday, log into your practice’s network, and there is a message that a hacker now controls your EHR and wants a ransom to allow you access. How could you have prevented this invasion? One way is by conducting a penetration test. This is a great tool to help determine your vulnerabilities and correct security holes in your network before a hacker can find them.
With the new year in full swing, the Office of Civil Rights (OCR) is set to begin Phase 2 of its HIPAA audits program, targeting specific areas of noncompliance in healthcare organizations and among business associates who come in direct contact with protected health information.
Earlier this year we launched our ICD-10 Training Lab, a suite of tools designed to help you prepare for the transition to ICD-10. Now with the transition behind us, we’ve decided to refocus our efforts into making improvements to the ICD-10 code lookup tool in order to provide you with an even better user experience.
In recent years, healthcare has learned a harsh truth: it will be just as affected by customer-satisfaction as any other industry. Health systems have responded by sprinting toward what seems to be a conversion from hospital to hospitality. Some are investing enormous amounts of money into providing luxurious accommodations with plenty of amenities, seemingly prioritizing customer service over any other aspect of operation.