What is Risk Management in Healthcare: Strategies, Importance, and Challanges
The average healthcare organization spends nearly $200,000 each year on risk management1 โ but what exactly are they trying to…
A Guide to Enterprise Risk Management
Key Points: Enterprise Risk Management (ERM) is critical for any health care organization. In simple terms, it is a strategy…
Darius Hall Promoted to IT Manager
We are excited to announce the promotion of Darius Hall, CISSP, to IT Manager. Since joining the team as a…
Behavioral Health Enforcement
Key Points: Following the COVID-19 pandemic, there has been a great spike in behavioral health services and a corresponding rise…
Update on EMTALA Enforcement
Key Points: The Emergency Medical Treatment and Active Labor Actย (EMTALA) remains one of the high-risk areas identified by the OIG…
Health Care Sector is the Top Target of Cybercriminals
10 Cybersecurity Tips Authorities report increasing ransomware attacks aimed at the healthcare sector, and the FBIโs Internet Crime Complaint Center (IC3)…
The European Unionโs AI Act: What is It and What You Should Know
On March 6, 2024, the European Union solidified its position as a global leader in AI legislation by giving final…
Considerations For Provider Nutraceutical Sales
In the world of healthcare, the sale of nutraceutical and dietary supplements has been and continues to be big business.…
OCR Guidance on Defending Against Common Cyber-Attacks
The number of reportable breaches of unsecured electronic protected health information (ePHI) affecting more than 500 individuals increased 45 percent…
One Billion CVS Records Accidentally Posted Online
Earlier this year, an independent cybersecurity researcherย discoveredย that a CVS Health database containing more than 1 billion data points was posted…
OIG Report Highlights Hospital Strains Caused by the Pandemic
The Department of Health and Human Services Office of Inspector General (OIG) recently conducted a โpulse survey,โ consisting of brief…
Phishing Attacks Remain A Serious Compliance Threat
Key Points: Data breaches are on the rise. Tips for compliance officers to counter information security threats are included below.…