Evolving Cyber Security Threats in Healthcare

Attention healthcare organizations! Learn some key areas to consider for your risk assessment this year.


HIPAA Security Compliance and OCR Audits

Here are the basics for you to keep in mind as you examine the rules and make your decisions about getting ready for the upcoming OCR audits.


Beware: Myths about Data Security and HIPAA Compliance

A critical first step in putting a compliant data security solution in place is separating fact from fiction. This article covers four common misassumptions you’ll want to know.


HIPAA Security Compliance: How risk tolerant are you?

By going beyond HIPAA security compliance and examining the underlying risks that the controls address, it’s easier to make decisions in an otherwise ‘loosely’ defined set of regulations.


Data Security: Building a Good Mobile Device Security Policy

Why worry about a mobile device security policy? Let’s discuss establishing a good set of organizational policies related to mobile computing devices.


OCR Audit Preparation Checklist for Healthcare

The OCR HIPAA Audit program is designed to analyze processes, controls, and policies of selected covered entities and business associates. The OCR has established a comprehensive audit protocol that contains the requirements to be assessed through these performance audits.


PODCAST: 2017 Year-End Healthcare Breach Review

In this podcast, LBMC Information Security’s Mark Fulford offers some leading theories for these statistics, as well as a quick rundown of the top five healthcare data breaches from 2017.


Understanding Cybersecurity and Cybersecurity Insurance

While cybersecurity insurance can help protect organizations after a data breach, it should never be a substitute for cybersecurity and risk management.


4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.


6 Essential Steps for an Effective Cybersecurity Risk Assessment

How do you get a comprehensive evaluation of your company’s vulnerability level? And, where do you start? Let’s look at some answers to these questions using the NIST 800-30, as it outlines six steps for an effective cybersecurity risk assessment.