How to Conduct a PHI Breach Risk Assessment

How to Conduct a PHI Breach Risk Assessment

Blog
Any time your healthcare organization experiences a PHI breach, you need to assess the nature and gravity of the harm done by that breach. The HHS OCR divvies out penalties…
How to Manage a PHI Data Breach

How To Manage a PHI Data Breach

Blog
As a healthcare provider, you do your best to protect your patients’ protected health information (PHI). But, despite your best efforts, you still might experience a PHI data breach. Not…
Things to Know About PHI Cyber Security

6 Things You Need To Know About PHI Cyber Security

Blog
Any healthcare business that processes protected health information (PHI) has to follow strict guidelines to safeguard that information. Since the majority of PHI is processed electronically (ePHI), healthcare providers need…
What Is Protected Health Information (PHI)?

What Is Protected Health Information (PHI)?

Blog
Cyberattacks targeting healthcare organizations are on the rise, and the consequences are significant. From regulatory penalties to reputation damage and, most importantly, risks to patient safety, a breach of patients’…
What Is PHI Compliance? Plus 6 Tips To Achieve It

What Is PHI Compliance? Plus 6 Tips To Achieve It

Blog
The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare providers to be good stewards of patient information. Protected health information (PHI) is governed by HIPAA, which requires healthcare providers…
What is a PHI Security Breach?

What Is a PHI Security Breach?

Blog
Digital technologies improve our lives, but they put our personal data at constant risk of theft and loss. Unfortunately, between 2015 and 2019, 76.59% of all data breaches reported were…