What to Include in Your Incident Response Plan

A security incident can topple an organization’s reputation and revenue in a short amount of time. As billionaire Warren Buffet once said, “it takes 20 years to develop a reputation and five minutes to ruin it.” Keeping that in mind, it’s ideal to have an incident response plan in place before a security breach occurs.   …

HIPAA Enforcement Action: OCR Resolves Twentieth Investigation in HIPAA Right of Access Initiative with $80,000 Settlement 

From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services announces the resolution of its twentieth investigation in its HIPAA Right of Access Initiative.  OCR created this initiative to support individuals’ right to timely access their health records at a reasonable cost under the HIPAA Privacy …

8 Elements of a Business Impact Analysis (BIA) for Compliance

A compliance program aims at protecting an organization from risk. The purpose of corporate compliance programs is to ensure that a business complies with laws or regulations relevant to it.  You could consider a Compliance Program to be a form of internal insurance policy to create evidence of conformity with regulations and instill a culture …

Why to Adopt a Comprehensive Backup and BCDR Strategy

Being a business owner is challenging. You have to deal with multiple problems at once and effectively solve each of those. You also need to have the foresight to arm your business with the right tools and solutions to deal with any issues that might arise later.  One such issue that you must always focus …

HIPPA Enforcement Action: OCR Settles Nineteenth Investigation in HIPPA Right of Access Initiative.

From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services has announced its nineteenth settlement of an enforcement action in its HIPAA Right of Access Initiative, which supports individuals’ right to timely access their health records at a reasonable cost under the HIPAA Privacy Rule. The …

HIPAA Enforcement Action: Clinical Laboratory Pays $25,000 to Settle Potential HIPAA Security Rule Violations 

From the HHS site “Peachstate Health Management, LLC, doing business as AEON Clinical Laboratories (Peachstate), has agreed to pay $25,000 to the Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) and to implement a corrective action plan to settle potential violations of the Health Insurance Portability and Accountability …

HIPAA Enforcement Action: OCR Settles Eighteenth Investigation in HIPAA Right of Access Initiative 

From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services announces its eighteenth settlement of an enforcement action in its HIPAA Right of Access Initiative. OCR announced this initiative to support individuals’ right to timely access of their health records at a reasonable cost under the …

How to Effectively Manage Supply Chain Risks

Digital transformation has made many things easier for businesses, right from inventory management and order processing to managing financials. On the flip side, however, it has also made companies more vulnerable to cyberattacks and data breaches. A breach occurring anywhere in the supply chain could end up seriously disrupting your operations. So, how do you …

Recommended Best Practices for a Secure Supply Chain

Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital that your security is upgraded on a regular basis to better prepare for any worst-case scenarios.  Having said that, it should come as no surprise that a vulnerable third party that your organization deals with …

How Disgruntled Insiders Pose a Serious Threat to Your Business-Critical Data

Merely mitigating external cybersecurity threats isn’t enough when it comes to fighting cybercrime in today’s ever-evolving threat landscape. Although insider threats can be as devastating and as deadly as their external counterparts, most businesses fail to track and manage insider threats adequately. As per the Data Exposure Report 2021 by Code42 and the Ponemon Institute, …