Compliance Tips

How a Functional Compliance Program Can Protect PHI

Before the digitization of healthcare records, protected health information (PHI) was mainly stored on paper charts and records and in data centers. The value of personal information was low. Now, however, ePHI is extremely valuable, and attackers will find a way in. As we way in the industry, “it’s not a matter of if. It’s when.” Healthcare organizations fend off tens of thousands of attacks every day.

Read more...

Shall We Play A Game?

Computer hackers have been around almost as long as computers themselves, but the risks to healthcare organizations are growing. On today’s episode, we explore cybersecurity in hospitals and health systems–what information hackers want, what to do after a breach occurs, and how to avoid one in the first place.

Read more...