HIPAA 公開
[search 0]
もっと

Download the App!

show episodes
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
 
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
 
Loading …
show series
 
We follow a lot of the Ponemon studies. They help us see changes and trends and make better recommendations to our clients. We are going to cover their annual cost of an insider breach study. This global study covers insider incidents and provides five signs your organization is at risk. More info at HelpMeWithHIPAA.com/374…
 
What will happen to my Ethereum after Ethereum's Merge? Blockchain Solutions and use cases - Zero Trust Solutions - PTG-Podcast-September-7-2022 Visit https://ComplianceArmor.com for the latest in Cybersecurity and Training. NO INVESTMENT ADVICE The Content is for informational purposes only, you should not construe any such information or other ma…
 
The ongoing, rapidly changing cyber war has created a need for us to change our viewpoint on cybersecurity. Yes, we need to worry about cyber hygiene and continue working on ways to secure our systems, networks and data. However, there is also a need to take the “plan for the worst but hope for the best” approach and start focusing on cyber resilie…
 
David admits that as a kid he would dumpster dive for “treasures” people threw away. We’ve heard more than once of clients who have gone dumpster diving to retrieve documents containing PHI that were mistakenly thrown away in the regular trash. But, a recent OCR announcement highlights one dermatology group that had quite the trashy privacy violati…
 
Should we be questioning other people and vendors we work with about the trust we should have in them? The answer is yes. Are they protecting and securing the patient data we entrust them with? Trust, but verify is something we talk about a lot. So, I ask you… should you be trusted? And can you prove it? More info at HelpMeWithHIPAA.com/371…
 
Privacy laws are being passed in more and more states every year. Even non-healthcare businesses are finding they must follow privacy laws in the states they do business in. Conducting a privacy assessment is a great way to understand what data you have that needs protecting, what things can go wrong and then, of those things that can go wrong, whi…
 
In order to protect PHI, you have to know where it is stored and how it comes in, goes out and moves around your organization. This includes marketing analytic tools used on websites and patient portals. They could be transmitting PHI to social media platforms. Very unnerving, right? More info at HelpMeWithHIPAA.com/369…
 
It’s that time again folks! October is Cybersecurity Awareness Month. This year’s theme is “It’s easy to stay safe online” with a weekly focus on key behaviors to help protect your important data. Using these free training tools and practicing basic cybersecurity behaviors, you are much more likely to stay safe online. More info at HelpMeWithHIPAA.…
 
An updated version of the security rule guide that we’ve all been waiting for! NIST has developed a cybersecurity resource guide on implementing the HIPAA Security Rule. It provides key activities, descriptions and sample questions to help covered entities and business associates comply with the HIPAA Security Rule. This guide has tons of good info…
 
OCR recently announced the resolution of 12 investigations. Eleven were for patient right of access violations and one was a big dollar settlement of a security incident at Oklahoma State University Center for Health Services. Lots to cover and learn in this episode. So, pay attention, folks. More info at HelpMeWithHIPAA.com/366…
 
Today’s podcast episode is all about why we worry about supply chain issues, why we keep talking about the HiC SCRiM guidance, and why the first day of the PriSec Boot Camp is supply chain risk management. We’ll review several supply chain breaches, one where there were 660 providers hit at once. As you probably have guessed, these breaches involve…
 
It can be a stressful time when you are adding a new vendor or switching vendors for your critical services. This is the time to create a plan and do a risk analysis to make sure everything gets transitioned and set up properly. Things can go wrong if there’s no plan in place. Today, we review some tips to help you prepare for a vendor transition. …
 
When you're shopping for cybersecurity insurance, the applications can be intense. You'll need to provide a lot of details about your current security protections, and you may be asked to complete a security audit. This is because insurance companies want to be sure that they're not insuring businesses that aren't doing everything they can to prote…
 
Ransomware tactics are constantly changing. Understanding the protections we use today will not be enough down the road is key. We must constantly adjust and adapt our security protections to protect against these attacks. Today, we are going to discuss ransomware stats and key points from two recent reports that can help you create a response plan…
 
We use passwords for everything. Creating a unique, secure password for every website and application is hard to remember, right? So, why hasn’t someone figured out how to get rid of passwords? Well, today we are going to talk about the FIDO password killer solution. More info at HelpMeWithHIPAA.com/361…
 
Today, we are going to give you our six takeaways from the 15th annual Verizon Data Breach Investigation Report. We like these reports because they give us an indication of what's going on in the cyber world, what we need to be looking for and looking out for. More info at HelpMeWithHIPAA.com/359
 
We get this question all of the time: How do they get in? How do the bad guys get in and attack my network? Seems like a simple question, right? Well there’s not always a clear cut answer. The first thing you need to understand is that cybersecurity isn't a problem you solve. It's a chronic condition that you have to manage. More info at HelpMeWith…
 
With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to may sure they are safe and that they don't get hacked, but how? In this episode, we give you practical tips and tricks to help keep your kids (and their devices) safe from hackers! Hosts: Craig, Erin, and B…
 
Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of millions of people around the world. The death and destruction are of no consequence to these bad actors and with millions of workers working remotely, hackers have a field day. Did your business go remot…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to ma…
 
In this episode, we talk about what a day in the life of a cybersecurity firm looks like, and what kind of mindset it takes to be successful in this industry. Are you thinking of making a switch? Do you know a young person who is looking for career advice? Listen in, and find out if it's right for you! Hosts: Blake and Erin Please like, subscribe a…
 
Everybody get on board because data security laws keep getting signed in states each year. The new Maryland and Kentucky data security laws are designed to help protect insurance companies from cyber attacks by implementing cybersecurity standards, developing, implementing, and maintaining a written information security program. Their service provi…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of …
 
Sometimes it seems as if America is ALWAYS the target of cybersecurity attacks. And that's because it kinda is! But what remakes the US such an attractive target? It's a complicated answer with multiple reasons - some that aren't too surprising, and others that may be harder to spot. But one thing is for sure: We in the US, collectively, need to ta…
 
Incident response planning is important to every business. You don’t want to figure out how to manage the business and respond to an incident on the fly. These plans should be reviewed and updated regularly. Today we review a brand new guide from the Healthcare & Public Health Sector Coordinating Council on Operational Continuity - Cyber Incident. …
 
We've all seen the news and read the headlines - Hackers aren't going anywhere anytime soon! In fact, quite the opposite is true... So what can YOU do to keep your company's name out of the papers? Listen in and find out! Hosts: Erin and Blake Please like, subscribe and visit all of our properties at: YouTube: https://www.youtube.com/channel/UC8Hgy…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With the rash of cyberscams and a huge portion of the workforce going remote, there has been a lot of talk about implementing a "Zero-Trust Framew…
 
Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to hear Craig's harrowing tail of 'Gator wrestling in the murky waters of North Carolina! Link: Craig Reels in a Gator in Arapahoe, NC! Host: Craig Co-Hosts: BJ, Blake, and Erin Please like, subscribe and v…
 
Over the last couple years, we’ve had some high-profile cybersecurity compromises and data breaches. And this trend is not slowing down. Today, we review a recent study of the top cyber threats to healthcare organizations. The results reinforce that PriSec teams require everyone to participate. More info at HelpMeWithHIPAA.com/354…
 
Hackers aren't going anywhere, any time soon, so a lot of companies are (wisely!) looking into cyberinsurance. However, not all companies know what they need to do to get cyberinsurance, or they try to use it as a replacement for ACTUAL cybersecurity. On today's podcast, we discuss the right (and wrong) ways to get cyberinsurance for your business.…
 
With the great shift in 2020 from working in offices to working from home, a lot of regular IT maintenance duties have fallen through the cracks. In this episode, Dwight from PTG has practical tips and tricks to help us (non-IT) work-from-home employees keep our hardware and devices from completely falling apart! Link: How to take good care of your…
 
We told you the top cybersecurity myths that you need to forget immediately; now we are going to let you in on the shocking reality that is the cyber realm. From insidious Russian viruses to the vast amount of simple human error, nothing is what it seems in the digital age! Link: Top 50 Cybersecurity Statistics, Figures and Facts Hosts: Blake, Dwig…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to…
 
We have seen and heard it all! On today's podcast, we discuss the most common cybersecurity myths and misconceptions that are out there. You won't want to miss this! Links: 10 cybersecurity myths you need to stop believing Hosts: Blake, Dwight, & Erin Please like, subscribe and visit all of our properties at: YouTube: https://www.youtube.com/channe…
 
It is crucial for every business to understand the security practices of their vendors. And also to make sure that those vendors are vetting their vendors. A cyber attack at a link in your supply chain can drastically affect your business. Evidence: the Okta breach. More info at HelpMeWithHIPAA.com/351…
 
On today's podcast, the PTG talks with their newest tech, Dwight, about not only his past experiences but also what he has learned along away. With over 30 years of IT/Cybersecurity/MSP experience (which includes working with PTG over a decade ago), we know he will add a lot of value to the team... We are thrilled to welcome him back! Hosts: BJ, Bl…
 
Have you heard the one about three dentists and a psychiatrist walk into... an OCR investigation? OCR has announced their first set of enforcement actions of 2022, and just in time for our 350th episode. These involve patient right of access and improper disclosure violations. More info at HelpMeWithHIPAA.com/350…
 
Today the PTG team talks about what PTG's Blake and Russia's Putin apparently have in common: an obsession with watches! We know this because Putin "confiscated" rare watches in response to Switzerland condemning Russia's invasion of Ukraine and Blake explains why watches are still so sought after, even with smartphones and smartwatches being as pr…
 
In today's episode, we discuss the psychological impact of hackers not having to see their victims face-to-face, as well as the impact solar flares can have on digital devices, and the importance of a steady flow of power to avoid frying your devices. Link: https://cybernews.com/cyber-war/russian-aviation-authority-switches-to-paper-after-losing-65…
 
In today's podcast, PreVeil's compliance manager, Noël Vestal, discusses how using Zero-Trust end-to-end encryption helps fight the Zero-Day attacks that are all the rage today, and why having trusted vendors is crucial when implementing compliance standards, especially when a government contract is on the line. Compliance takes hard work - even wi…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** In today's podcast, PreVeil's compliance manager, Noël Vestal, discusses how using Zero-Trust end-to-end encryption helps fight the Zero-Day attac…
 
A number of Morgan Stanley clients fell victim to a Vishing scam. "What is a vishing scam?" you ask… Great question! But if Morgan Stanley wasn't breached (this time), how exactly did the hackers know who to target? Join the PTG team, along with Jamel from Gatekeeper, as we explore these questions and discuss what actions you can take to keep yours…
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** In today's episode, we discuss the psychological impact of hackers not having to see their victims face-to-face, as well as the impact solar flares can…
 
Donna made many notes from the HIPAA Summit. Today, she and David will share six of her top picks, including the difference between an incident and a breach, how a “check the box compliance program” is not a privacy and security program, importance of understanding what your vendor’s incident response plans are and more. More info at HelpMeWithHIPA…
 
If you are a massive crypto exchange and tens of thousands of accounts are hacked, is it the tens of thousands of users' fault, or is it possible that maybe the company's cyber hygiene isn't passing the "sniff" test? Join the PTG team as they discuss the hacks and explore what exactly is going on. Links: https://www.reuters.com/business/finance/coi…
 
In today's episode, the PTG team breaks down, step-by-step, the safeguards recommended by the White House in their special announcement, released on Monday, March 21, 2022, entitled, "Statement by President Biden on our Nation’s Cybersecurity," as well as the accompanying "FACT SHEET: Act Now to Protect Against Potential Cyberattacks" in which the …
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login