Blog

Read the latest blog posts by CynergisTek's team of experts related to various healthcare cybersecurity, privacy, compliance, and managed print topics.

  • User Access Monitoring in the Current COVID-19 Crisis

    User Access Monitoring in the Current COVID-19 Crisis

    It might be tempting for covered entities and business associates to put-off some of their regulatory or compliance obligations as other priorities evolve in the current crisis. Whether to do that...

    Read More
  • OCR Allows Internet Apps for Telehealth During COVID-19 Emergency

    OCR Allows Internet Apps for Telehealth During COVID-19 Emergency

    In a pair of sweeping directives that will have far reaching implications for healthcare providers and their patients, the Office for Civil Rights (OCR) issued guidance and FAQs through which the...

    Read More
  • Some HIPAA Requirements Waived for Hospitals in Response to Coronavirus

    Some HIPAA Requirements Waived for Hospitals in Response to Coronavirus

    The Secretary of HHS has declared a nationwide public health emergency. The declaration includes a suspension of some of the requirements of the HIPAA Privacy Rule for hospitals to help ease...

    Read More
  • Stay Informed About COVID-19 With CTEK

    LEARN MORE
  • OCR Allows Use of Videoconferencing During Coronavirus Emergency

    OCR Allows Use of Videoconferencing During Coronavirus Emergency

    Healthcare providers may provide treatment services to patients using a variety of non-public facing telehealth technologies without complying with the requirements of the HIPAA Privacy and...

    Read More
  • Malware From Fake COVID-19 Website

    Malware From Fake COVID-19 Website

    The Health Sector Cybersecurity Coordination Center (HC3) has published a new alert. Please distribute through your proper channels, as appropriate. A malicious website pretending to be the live...

    Read More
  • HSCC Recommendations In Response To COVID-19

    HSCC Recommendations In Response To COVID-19

    The Healthcare and Public Health Sector Coordinating Council (HSCC) today released recommendations for healthcare organizations to manage teleworking strategies during the COVID-19 response. While...

    Read More
  • ×

    Subscribe to Our Monthly Cyber Bulletins with the Latest News, Tips and More!

    First Name
    Last Name
    Company
    State
    Thank You!
    Error - something went wrong!
  • Why Cyber Resilience Matters to the CFO

    Why Cyber Resilience Matters to the CFO

    The evidence is clear, healthcare providers that underfund their cyber resilience plans suffer serious financial impacts following a security breach or ransomware attack. The immediate needs are...

    Read More
  • Thinking About Buying New IoT Devices? Better Wait ‘til Next Year for Better Security Features!

    Thinking About Buying New IoT Devices? Better Wait ‘til Next Year for Better Security Features!

    IoT Devices Vulnerable to Cybersecurity Threats   Healthcare organizations, like other businesses, are integrating “smart technologies” into devices and facility controls that are connected to the...

    Read More
  • Debunking Four Common Myths of the California Consumer Privacy Act (CCPA)

    Debunking Four Common Myths of the California Consumer Privacy Act (CCPA)

    Read David Holtzman’s latest blog post as he talks about how CCPA applies to healthcare, non-profits, and data outside of California.

    Read More
  • New York’s Sweeping Data Protection & Breach Notification Law Now in Full Force

    New York’s Sweeping Data Protection & Breach Notification Law Now in Full Force

    New York’s Stop Hacks and Improve Electronic Data Security (SHIELD) Act that amends the state’s breach notification law now in full effect. The SHIELD Act significantly expands what...

    Read More
  • What Cybersecurity Risks does Bluetooth® Face?

    What Cybersecurity Risks does Bluetooth® Face?

    New Vulnerabilities Recently Discovered in Bluetooth ® Paring Specifications Vulnerability Overview Hospitals and other providers rely heavily on Bluetooth® connections for not only the ubiquitous...

    Read More
  • OCR Business Associate Fact Sheet Sets Floor and AMCA Breach Shows Why We Must Do More

    OCR Business Associate Fact Sheet Sets Floor and AMCA Breach Shows Why We Must Do More

    Why Having a Vendor Security Management Program is Necessary News of a cybersecurity incident compromising the personally identifiable information of the American Medical Collections Agency...

    Read More
  • End-of-Life Is Not a Suggestion, It Is a Fact

    End-of-Life Is Not a Suggestion, It Is a Fact

    About five years ago everyone who worked in IT was talking and thinking about how to deal with the impending end-of-life for the massively popular Windows XP operating system. At that time, I was...

    Read More
  • Stay Informed About COVID-19 With CTEK

    LEARN MORE
  • Why Workforce Cybersecurity Education and Training Is Essential

    Why Workforce Cybersecurity Education and Training Is Essential

    Organizations consistently struggle with the need to maintain a well-trained, well-informed, workforce but relegate the need to online Computer Based Trainings (CBTs) that provide little true...

    Read More
  • HHS Proposed Information Blocking Rules and OCR FAQs

    HHS Proposed Information Blocking Rules and OCR FAQs

    The Office of the National Coordinator (ONC) released its long-awaited proposed rule on interoperability and information blocking, the 21st Century Cures Act, by identifying conduct that is not...

    Read More
  • The Future of Healthcare Security

    The Future of Healthcare Security

    The start of a new year causes us to reflect on the past year and determine both the current state of the industry as well as where we are heading. As 2018 began everyone poured over the 2017...

    Read More
  • A Management Model To Address Medical Device Risks

    A Management Model To Address Medical Device Risks

    Would You Like a Wake-Up Call? Looking back, the December 2016 Food and Drug Administration’s Pre-Market and Post-Market Cybersecurity Management Guidance captured the attention of many medical...

    Read More
  • Documentation: The Necessary Evil of IT

    Documentation: The Necessary Evil of IT

    One of the most dreaded terms in the world of information technology and security (IT/IS) is “documentation”. Not because it isn’t massively helpful to everyone, or really for any reason other...

    Read More
  • Sneak Peek of CynergisTek’s Presentations at HIMSS19

    Sneak Peek of CynergisTek’s Presentations at HIMSS19

    The annual HIMSS Global Conference & Exhibition is fast approaching. From February 11 to 15, Orlando, Florida, will be the home for over 45,000 professionals from 90 international locations....

    Read More
  • 2018 Educational Workshop Feedback

    2018 Educational Workshop Feedback

    Cyber-attacks have been an increasing security and privacy threat to organizations, in fact the 2018 Cost of a Data Breach Study: Global Overview by Ponemon states that the health industry has one...

    Read More
  • loading
    Loading More...