Are your cloud services really compliant with HIPAA and other regulations?
Mike Semel- Recorded Session
Does your organization collect and share consumer health information? When it comes to privacy, you’ve probably thought about the Health Insurance Portability and Accountability Act (HIPAA). But did you know that you also need to comply with the Federal Trade Commission (FTC) Act? This means if you share health information, it’s not enough to simply consider the HIPAA Privacy Rule. You also must make sure your disclosure statements are not deceptive under the FTC Act.
CYBERSECURITY – VOICE IS DATA. IS YOURS PROTECTED?
Mike Semel- Recorded Session
COVID-19 has exposed cybersecurity issues with popular web meeting tools. What about the phone system? Digital voice recordings, voice messages, and recorded web meetings need to be secured and compliant with regulations. VOIP is nothing more than an on-premise or cloud-based computer system that needs the same security considerations as sensitive databases and document storage. Cybersecurity and compliance expert Mike Semel will help you leverage security as a competitive advantage.
Explore Mike's Blog Articles
Cybersecurity Policies are Finally Put Where They Belong – Last
This guidance looks at top threats against healthcare organizations, including phishing e-mails, ransomware, loss/theft of devices or data, insider threats, and connected medical devices. Cybersecurity practices to prevent each are clearly defined and broken down into understandable steps.
Cybersecurity, HIPPA, Mike Semel
This guidance looks at top threats against healthcare organizations, including phishing e-mails, ransomware, loss/theft of devices or data, insider threats, and connected medical devices. Cybersecurity practices to prevent each are clearly defined and broken down into understandable steps.
|
Are You Investing Enough in IT Security?
Would you put a $ 10 fence around a $ 100 horse? Does it make sense to put a $ 100 fence around a $ 10 horse? For the right security, you need to know what your horse is worth. The same concepts apply to protecting your data. What is your data worth?
Cybersecurity, IT Security, Mike Semel
Would you put a $ 10 fence around a $ 100 horse? Does it make sense to put a $ 100 fence around a $ 10 horse? For the right security, you need to know what your horse is worth. The same concepts apply to protecting your data. What is your data worth?
|
The 7 HIPAA Audit Items the Feds Selected
On July 11 letters were sent BY E-MAIL ( check your junk mail folders! ) to 167 health plans, health care providers, and health care clearing houses (all HIPAA Covered Entities notifying them that they have to send in documentation for a ‘desk audit.’ They will have 10 days to send in the ...
Audit, compliance, HIPPA, Mike Semel
On July 11 letters were sent BY E-MAIL (check your junk mail folders!) to 167 health plans, health care providers, and health care clearing houses (all HIPAA Covered Entities notifying them that they have to send in documentation for a ‘desk audit.’ They will have 10 days to send in the required materials for review.
|
Security & Compliance are Executive Responsibilities
You can deal with Security and Compliance at the executive level now, and invest adequate attention and resources, or you can deal with it later trying to explain to an angry public why you had a data breach or an IT security crisis.
compliance, HIPPA, Mike Semel, security
You can deal with Security and Compliance at the executive level now, and invest adequate attention and resources, or you can deal with it later trying to explain to an angry public why you had a data breach or an IT security crisis.
|