HipLink Blog

HipLink Insights

Welcome to our Blog! Please join the conversation with the latest company news and industry trends!

Subscribe to this list via RSS Blog posts tagged in ransomware
02
Sep
2

Keeping PHI Secure to Avoid HIPAA Data Breaches

Posted by on in Healthcare

 In this rapidly advancing technological world, an increasing number of healthcare providers are incorporating electronic health record (EHR) technology. In addition, they are also connecting to health information exchanges more frequently, making patient health information (PHI) more susceptible to online security threats as well as possible HIPAA data breaches.

 

The convenience of PHI being more accessible to providers also carries the risk of being more accessible to hackers and unauthorized users.   Effectively monitoring and managing potential risk is imperative for a healthcare organization.  Risk assessments play a key role in staying HIPAA compliant.  Mobile devices and ransomware threats are examples of why healthcare providers need to be prudent in their risk analyses.  The slightest oversight or lapse could lead to a HIPAA data breach as well as a lengthy, expensive recovery course.

Continue reading
Last modified on
Hits: 7922
0
Recent Comments - Show all comments
  • David Malan
    David Malan says #
    Such great information! The HIPAA Security Rule is only concerned with the protection of ePHI that is created, received, or used e
  • anonymous
    anonymous says #
    GOOD POST
29
Jul
1

Secure, Reliable Messaging and Ransomware

Posted by on in IT - Information Technology

How do you keep your communication flow during a cyber attack? The recent cyber attacks in hospitals are raising many questions about safety and security within many organizations.

CNN just recently reported that Ransomware is growing and that the FBI received 2,453 complaints about Ransomware hold-ups last year, costing the victims more than $24 million dollars”. CSO Online reported that incident response teams are dealing with 3-4 Ransomware incidents weekly. They also report that ransom requests have increased considerably and that in many cases the cost of recovery is so extreme that the only valid option is to consider payment.

Criminals sneak in through various techniques such as “man in the middle” attacks, lock the system and demand a ransom to unlock it. They rely on Bitcoins (XBT) since those are difficult to trace to actual people. Many of these hackers have offshore accounts and the chances of actually getting your money back or catching someone a world away” is highly unlikely.

Continue reading
Last modified on
Hits: 7899
0
Recent comment in this post - Show all comments
  • Wendy H.
    Wendy H. says #
    Great blog- thanks for posting. Really enjoyed reading it.