Author: Tyler Howard (Tyler Howard)

Home » Archives for Tyler Howard
Understanding the Bloodborne Pathogens Standard (BBP) by OSHA
Post

Understanding the Bloodborne Pathogens Standard (BBP) by OSHA

Introduction to the Bloodborne Pathogen Standard The Bloodborne Pathogens Standard (29 CFR 1910.1030), introduced by the Occupational Safety and Health Administration (OSHA), serves a crucial role in safeguarding workers across various industries from the health hazards associated with bloodborne pathogens. This standard extends its coverage to all occupational exposure to blood or other potentially infectious...

Post

The Impact of the Change Healthcare Cyberattack: Implications for HIPAA and Healthcare Organizations

In the ever-evolving landscape of cybercrime, the healthcare sector continues to be a prime target due to the sensitivity of the data it holds. Recently, the healthcare industry has been in turmoil over another significant attack on a prominent player in healthcare technology and data analytics.   Change Healthcare experienced the attack on February 21st,...

Understanding HIPAA’s Right of Access
Post

Understanding HIPAA’s Right of Access

In this ever-evolving healthcare landscape, having access to one’s personal health information is essential to empowering individuals to take control of their own health decisions. The Health Insurance Portability and Accountability Act (HIPAA) serves as a cornerstone in safeguarding individuals’ personal health information, and one critical component of HIPAA is the Right of Access. What...

The total compliance solution medsafe
Post

The Road To Compliance

As a compliance partner, MedSafe has developed a strategy to ensure all compliance gaps within our clients’ programs are filled in upon onboarding. The idea is to dive into conversation making an effort to really understand what our clients are looking for, but also to ask questions allowing us to dot the i’s and cross...

business-email-compromise-feature
Post

How to Spot AI-Generated Phishing Emails: Recognizing the Warning Signs and Safeguarding Against Cyber Risks

As the healthcare industry becomes increasingly reliant on digital communications, the threat of phishing attacks has grown significantly. With the emergence of AI technology, cybercriminals have found new ways to craft phishing emails that can deceive even the most cautious individuals. These malicious emails often target healthcare organizations, aiming to steal sensitive patient information, compromise...

health worker reviewing data
Post

HHS Urges Health Systems to Prioritize Cybersecurity Measures

Healthcare cybersecurity incidents have more than doubled since 2018, while ransomware attacks have surged close to 300%. This tsunami of cybercrime has led to extensive care disruptions, patient safety risks, and an increased strain on the already overwhelmed healthcare sector. With cybersecurity incidents occurring on an almost daily basis, federal regulators are now looking to...

cybersecurity on a doctor office computer
Post

AI Could Increase the Number of Healthcare Breaches: How Healthcare Organizations Can Mitigate the Risks

Artificial intelligence (AI) has emerged as a transformative force that promises to revolutionize the way care is delivered as we know it. From enhancing diagnostics and patient care to streamlining administrative tasks and contributing to medical research, its potential seems limitless. However, with all of its promises, there are increasing concerns about the many risks,...

HIPAA Apply to Wearable Health Technology
Post

Does HIPAA Apply to Wearable Health Technology?

The rapid adoption of smart wearable technology among consumers has been fueling growth across the industry. In fact, the U.S. wearable technology market was valued at 61 billion in 2022 and is expected to see significant growth of nearly 15% from 2023 to 2030. For some, wearable technology is about tracking fitness, but for many these...

email displayed on a computer
Post

How to Spot a Phishing Email (Part 2)

Examples of a Phishing Email Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. Examples include: 1) “We have noticed suspicious activity with your account. Please login to the link below.” 2) “We have noticed there is a problem with your account or...

email messages on an iphone
Post

How to Spot a Phishing Email (Part 1)

Cybercriminals have been increasingly targeting the healthcare industry, and phishing is one of the most common ways that they try to gain access to healthcare networks and sensitive patient data. Recognizing and avoiding phishing emails is crucial to protecting patient data and maintaining the safety and integrity of healthcare systems. What is phishing? According to...