Remove category healthcare-security
article thumbnail

Cybersecurity a Top Priority – HHS Publishes New Cybersecurity Performance Goals

Health Care Law Brief

Department of Health and Human Services (“HHS”) has expanded upon its recent Healthcare Sector Cybersecurity Concept Paper (which we covered in a prior blog post ), issuing cybersecurity performance goals (“CPGs”) for the healthcare and public health (“HPH”) sector.

article thumbnail

Verizon's BlueJeans Telehealth integrates with Apple Health

Healthcare IT News - Telehealth

The integration will allow patients to share data such as heart rate, sleep and falls with their provider, said BlueJeans Chief Innovator and Strategist Krish Ramakrishnan in a blog post. Kat Jercich is senior editor of Healthcare IT News. Healthcare IT News is a HIMSS Media publication. Twitter: @kjercich.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HIPAA Incident Response Requirements

MedTrainer

For healthcare organizations, adhering to HIPAA not only means safeguarding patient privacy but also preparing a robust HIPAA incident response plan for a possible data breach or unauthorized disclosure. That’s why healthcare organizations should enact protective measures and response strategies to promptly address potential vulnerabilities.

HIPAA 52
article thumbnail

What is a HIPAA Incident Response Plan?

MedTrainer

It’s bad enough when a healthcare organization exposes patient protected health information (PHI). In simpler terms, if someone who doesn’t have permission to see or use patient information gains access to it in a way that compromises the security or privacy of that information, a HIPAA incident has occurred.

HIPAA 52
article thumbnail

CISA Releases Decision Tree Methodology for Assessing and Remediating Software Vulnerabilities

HIPAA Journal

CISA has issued a decision tree methodology that can be adopted by healthcare organizations to help them develop an efficient and effective vulnerability management program. Healthcare organizations with mature vulnerability management programs are more likely to have efficient processes for vulnerability management.

HIPAA 101
article thumbnail

HRSA Credentialing: Master the Operational Site Visit

MedTrainer

Keeping these straight in a very fast-paced healthcare environment is tough! In this blog, we’ll look at the unique aspects of HRSA credentialing requirements and why many community health centers, FQHCs , and look-alikes use credentialing software to prepare for a successful on-site visit. What Are HRSA Operational Site Visits?

article thumbnail

Medicare Enrollment & Behavioral Health Credentialing

MedTrainer

In this blog post, we’ll explore these and how behavioral health practices are adopting technology to prepare for the future. Innovations that offer enhanced accessibility, scalability, and data security are in high demand as behavioral health providers look for ways to streamline the credentialing workflow. billion by 2030.