Author Archives: Blog HIPAA

New Washington D.C. Data Breach Notification Law Takes Effect

On May 19, 2020, legislative changes to the Washington D.C. data breach notification law took effect. The changes were introduced in March and significantly updated existing breach notification requirements. There has been a major expansion of data classified as personal information that warrants breach notifications if subjected to unauthorized access and new data security requirements… Read More »

Mat-Su Surgical Associates Suffers Ransomware Attack

Palmer, AK-based Mat-Su Surgical Associates has announced it was attacked with ransomware in March. The attack was discovered on March 16 when staff were locked out of its computer systems as a result of the encryption of essential files. A team of independent computer forensics investigators were engaged to assess the nature and scope of… Read More »

South Texas Children’s Dentistry Confirmed as HIPAA Compliant

South Texas Children’s Dentistry has been confirmed as having implemented an effective HIPAA Compliance program by Compliancy Group. South Texas Children’s Dentistry had taken steps to comply with the Rules of the Health Insurance Portability and Accountability Act (HIPAA), but to make sure that no aspect of HIPAA had been missed and to ensure continuing… Read More »

NetWalker Ransomware Gang Targeting the Healthcare Industry

While some threat groups have stated that they will not attack healthcare organizations on the frontline in the fight against COVID-19, that is certainly not the case for the operators of NetWalker ransomware, who have been actively targeting the healthcare industry during the COVID-19 public health emergency . Recent research conducted by Advanced Intelligence LLC… Read More »

H-ISAC Publishes Framework for Managing Identity in Healthcare

The Health Information Sharing and Analysis Center (H-ISAC) has published a framework for CISOs to manage identity and defend their organization against identity-based cyberattacks. This is the second white paper to be published by H-ISAC covering the identity-centric approach to security. The first white paper explains why an identity-centric approach to cybersecurity is now needed,… Read More »