Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and sold by cybercriminals; a place known as the “Dark Web”. An article...
Breaches are becoming increasingly common as cybercriminals continue to advance their skills and tactics to trick their victims into falling for their scams. While cybercriminals are remaining diligent in their efforts to carry out their attacks, small business owners continue to underspend on cybersecurity. An article on Entrepreneur looks at 5 things your employees are...
Matthew Fisher, ESQ and Jonathan Krasner Healthcare represents a very large segment of our economy – approaching 20% by some estimates. As such, healthcare organizations come in many sizes and flavors. We are all, hopefully, familiar with the basics that HIPAA compliance requirements apply Covered Entities, Business Associates and subcontractors. A CE and a BA...
The dark web is often known for the illegal activities conducted there, and while not everything on the dark web is illegal, it’s most appealing factor is its anonymity. The dark web is often a place where stolen data and personal information is bought and sold following a data breach or hacking incident. An article...
This is a guest post by Pawan Jindal of MyMIPSScore and originally appeared at the MyMIPSScore Blog Under MACRA, Advancing Care Information(ACI) category of MIPS replaced Meaningful Use. As we discussed briefly in the 10 step overview of MIPS, ACI scoring under MIPS is determined based on the provider’s performance for a set of base...
Recent Comments