Why to Adopt a Comprehensive Backup and BCDR Strategy

Being a business owner is challenging. You have to deal with multiple problems at once and effectively solve each of those. You also need to have the foresight to arm your business with the right tools and solutions to deal with any issues that might arise later.  One such issue that you must always focus …

HIPPA Enforcement Action: OCR Settles Nineteenth Investigation in HIPPA Right of Access Initiative.

From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services has announced its nineteenth settlement of an enforcement action in its HIPAA Right of Access Initiative, which supports individuals’ right to timely access their health records at a reasonable cost under the HIPAA Privacy Rule. The …

HIPAA Enforcement Action: Clinical Laboratory Pays $25,000 to Settle Potential HIPAA Security Rule Violations 

From the HHS site “Peachstate Health Management, LLC, doing business as AEON Clinical Laboratories (Peachstate), has agreed to pay $25,000 to the Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) and to implement a corrective action plan to settle potential violations of the Health Insurance Portability and Accountability …

HIPAA Enforcement Action: OCR Settles Eighteenth Investigation in HIPAA Right of Access Initiative 

From the HHS site “The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services announces its eighteenth settlement of an enforcement action in its HIPAA Right of Access Initiative. OCR announced this initiative to support individuals’ right to timely access of their health records at a reasonable cost under the …

How to Effectively Manage Supply Chain Risks

Digital transformation has made many things easier for businesses, right from inventory management and order processing to managing financials. On the flip side, however, it has also made companies more vulnerable to cyberattacks and data breaches. A breach occurring anywhere in the supply chain could end up seriously disrupting your operations. So, how do you …

Recommended Best Practices for a Secure Supply Chain

Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital that your security is upgraded on a regular basis to better prepare for any worst-case scenarios.  Having said that, it should come as no surprise that a vulnerable third party that your organization deals with …

How Disgruntled Insiders Pose a Serious Threat to Your Business-Critical Data

Merely mitigating external cybersecurity threats isn’t enough when it comes to fighting cybercrime in today’s ever-evolving threat landscape. Although insider threats can be as devastating and as deadly as their external counterparts, most businesses fail to track and manage insider threats adequately. As per the Data Exposure Report 2021 by Code42 and the Ponemon Institute, …