Protect PHI:
Put 3 Skills in Your HIPAA-Compliance Toolbox
Published on Thu Jan 17, 2019
Foil insider breach threats. You may be ready for ransomware takedowns and other outside dangers to your lab’s protected health information (PHI), but are you ready for breaches caused by insider threats? Reality: According to the United States Computer Emergency Readiness Team (US-CERT), there are two types of insider threats: malicious and unintentional. Employees, business associates (BAs), and vendors who [...]