BMN Blog

JUN 13
Are your Portable Devices Safe? By Curtis Woods, President at Integrated Solutions, LLC in Technology

Over the last few years, cell phones have become computers, capable of much of the functionality that your office computer has. This is also true for small portable devices such as iPads, Windows and Android tablets. Are these devices and applications as secure as those you use from your clinic? In most cases, the answer is no.

Read More
 
NOV 05

A look at the calendar tells us that we only have a short time left in 2018. That means many practices will be looking to complete their Security Risk Assessments in order to either qualify for the 2018 Merit-based Incentive Payment System (MIPS) or to simply fulfill their obligations to comply with the HIPAA Security Rule.

Read More
 
MAY 16
ePHI Safeguards Requirements and Small Practices: What Physicians Need to Know By Hayley Scheer, J.D., LL.M. Health Law Attorney, Cabaniss, Johnston, Gardner, Dumas & O’Neal LLP in Regulatory

It is especially important for smaller practices to be mindful of Electronic Protected Health Information (ePHI) security regulations – a breach of ePHI can lead to costly notification requirements and potential monetary penalties under the HITECH Act.[1]  Managing physicians of small independent practices hold many responsibilities, including the duty to comply with the Security Rule within HIPAA regulations.  This article provides a brief overview of federal ePHI compliance safeguards required in a practice.  While not meant to be a comprehensive discussion of all requirements, it highlights legal considerations and safeguards a practice must implement to comply with HIPAA ePHI regulations.  The federal Security Rule under HIPAA requires a health care provider (typically known as a Covered Entity[2]) to have the minimum ePHI safeguards, listed below.

 

Read More
 
APR 03

According to the Ponemon Institute – www.ponemon.org  - the average cost of a data breach was $3.62 million dollars. This breaks down to $141 dollars per stolen record. International Data Corporation – www.idc.com – estimates that globally data storage will grow ten-fold by 2025 total of 163 zettabytes (a trillion gigabytes) by 2025. Data is stored in a vast range of devices including your smart phone, laptops, notebooks, workstations, tablets and even on your smart TV. Most businesses focus on the technical aspects of how to avoid data breaches (firewalls, anti-virus, security patches, etc.) and often how physical technical assets are destroyed at the end of their life are often overlooked or do not have a set process in place.

Read More
 
Powered by Bondware
News Publishing Software

The browser you are using is outdated!

You may not be getting all you can out of your browsing experience
and may be open to security risks!

Consider upgrading to the latest version of your browser or choose on below: