Diabetes App Security Advisory from CISA

monitor

Patients and physicians who have the devices listed below and use the mylife Cloud and/or mylife Mobile Application should update to the current version of the application and update account passwords ASAP. The app is not sufficiently protecting usernames and passwords making their data vulnerable to exposure/hacking. https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 mylife website: https://www.mylife-diabetescare.com/en/products/therapy-management/mylife-digital.html mylife Diabetescare devices: Ypsomed […]

The 21st Century Cures Act and Healthcare Information Blocking

What is information blocking? Anything a healthcare provider knows is likely to interfere with the ability of a patient or other authorized person(s) to access, exchange, or use electronically protected health information (ePHI). Taking longer than allowed to respond to patients’ requests for access to their records, or not responding at all. Charging patients a […]

OCR Alert – Postcard Disguised as Official Communication

scam for OCR alert

Some healthcare organizations have received postcards that appear to be from the OCR that they are required to participate in a “Required Security Risk Assessment” and they are to send their risk assessment to a website. This is not from the OCR or the U.S. Department of Health and Human Services, it is an advertisement […]

Information Blocking – Digging Deeper

HIPAA Requirements

Healthcare providers are not required to do anything new or buy new software to comply with the upcoming Information Blocking Rule issued by the HHS Office of the National Coordinator for Health Information Technology (ONC). However, understanding how your current policies and procedures could conflict with the rule’s requirements is a good exercise to start […]

Protecting Your Cybersecurity

OSHA and HIPAA compliance additional seats

If you use an on-premises Microsoft Exchange Server, it is important to reach out to your IT Support immediately to be sure updates are installed to boost your cybersecurity and protect against recently discovered critical security vulnerabilities. The vulnerabilities allow an attacker to compromise your network and steal information, encrypt data for ransom, or even […]

Upcoming Changes to HIPAA Not Set in Stone

Total Medical Compliance Newsletter February 2021 picture

Last month HHS released a set of proposed upcoming changes to the HIPAA Privacy Rule. Anyone can review and submit comments about the proposed changes until March 22, 2021. After that, HHS will review all comments and make any changes they feel are necessary and issue a final rule that will require compliance. This can […]

HIPAA: WHEN A MINOR BECOMES AN ADULT

When a minor becomes an adult, they become the owner of their medical record.  Here are a couple of things to consider: When does a minor become an adult; What does the practice need to do to ensure proper handling of the record according to HIPAA. A minor can become an adult in several ways. […]

21st Century Cures Act and Patient Data

patient access to health information

In March, the HHS Office of the National Coordinator for Health Information Technology (ONC) issued new rules to prevent health care providers, developers of certified health IT, and others in the healthcare industry from engaging in activities that block a patient’s access to their electronic health information. Building on the 21st Century Cures Act, these […]

A Simple Inventory List Can Reduce Risk

inventory list

Keeping track of your equipment, office furniture, and similar items for financial purposes is a routine part of business. It is tough to protect something if you do not know where it is or that it even exists. That is why making an inventory list of devices and software your office owns and uses, particularly […]

Social Engineering and Cyberattacks

avoid scams infographic

Pretending to be someone else over the phone was a lot easier before caller-ID was invented. People took advantage of it in fun ways (like making prank phone calls after school), and others did in inappropriate and illegal ways. After caller-ID became a standard feature, as with most technologies, ways to bypass or disable it […]