Remove hipaa-hosting-solutions
article thumbnail

Webinar Next Week: 12/14/2022: Solving HIPAA Compliance (Software Demonstration)

HIPAA Journal

Achieving and maintaining compliance with the Privacy, Security, Breach Notification, and Omnibus Rules of the Health Insurance Portability and Accountability Act (HIPAA) can be a challenge for HIPAA-regulated entities. The software solution saves clients time and eliminates all the guesswork associated with the implementation process.

article thumbnail

SysAid Zero-Day Vulnerability Exploited to Deploy Clop Ransomware

HIPAA Journal

A zero-day vulnerability in the SysAid IT service management solution is being exploited by the Lace Tempest (aka FIN11, DEV-0950, TA505) threat group to gain access to SysAid servers, steal data, and deploy Clop ransomware. In one attack, a Cobalt Strike listener was deployed on compromised hosts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HPH Sector Urged to Make FIN11 Threat Group a Priority for Security Teams

HIPAA Journal

Recent attacks include the exploitation of zero day vulnerabilities in file transfer solutions to gain access to sensitive data, which is stolen and threatened to be released if a ransom is not paid. The post HPH Sector Urged to Make FIN11 Threat Group a Priority for Security Teams appeared first on HIPAA Journal.

article thumbnail

Lawsuit Filed Against Conifer & Tenet Healthcare Over Email Account Breach

HIPAA Journal

The lawsuit names Conifer Value-Based Care, Conifer Health Solutions, Conifer Revenue Cycle Solutions, and Tenet Healthcare Corporation as defendants. The lawsuit was filed in response to a breach of a Microsoft 365-hosted business email account that was detected on April 14, 2022.

HIPAA 96
article thumbnail

How to Ensure HIPAA Compliance While Storing PHI on the Cloud

Total HIPAA

The cloud provides a safe platform for businesses to host some or all of their computer infrastructure. Making use of cloud hosting companies’ cutting-edge technologies may offer greater security than an on-premises solution. HIPAA Regulations: What Do They Require? HIPAA Regulations: What Do They Require?

HIPAA 52
article thumbnail

Preserving Patient Confidentiality: Prioritizing Security in Healthcare Facilities

Total HIPAA

Iceberg Cyber specializes in network security solutions, including vulnerability scanning, to identify and mitigate potential risks. In line with our commitment to providing valuable insights, we are excited to announce that we will be hosting a webinar on July 19th at 2:00pm featuring the founder of Iceberg Cyber.

HIPAA 52
article thumbnail

How to Maintain HIPAA Compliance in Public Cloud Environments

Total HIPAA

The benefits of public cloud computing solutions make them very attractive to all types of businesses. In this article, we are going to discuss the factors and characteristics of public cloud solutions that are important for companies operating in the healthcare field in the United States. HIPAA compliance and cloud computing.

HIPAA 52