From the category archives:

Security

by: at .

How to properly store physical HIPAA documents

May 24, 2021

From Medical Economics: ME: If physical copies are converted to electronic records, can the physical copies then be destroyed? Rangel: Yes, you can destroy the paper records after they’re scanned. Usually, after they’ve been reviewed for a certain amount of time, generally speaking, 30 to 60 days, once you can actually qualify that all of […]

Share
Read the full article →

ADA comments on HIPAA Privacy Rule

May 13, 2021

From ADA News: The ADA is asking the U.S. Department of Health and Human Services Office for Civil Rights to consider the burdens changes to the HIPAA privacy rule will impose on covered providers, including dentists. Source: ADA comments on HIPAA Privacy Rule Some of the changes OCR is proposing include: These proposed changes include […]

Share
Read the full article →

Ohio Medical Center Pays OCR $65K for HIPAA Right of Access Failure

May 11, 2021

From Health IT Security: OCR reached a $65,000 settlement with the University of Cincinnati Medical Center, after failing to respond to a patient’s request for access to her medical records, as required by HIPAA. Source: Ohio Medical Center Pays OCR $65K for HIPAA Right of Access Failure Many dentists and dental team members are not […]

Share
Read the full article →

Explaining the HIPAA Safe Harbor Act

May 6, 2021

Thank you to Danielle McKinley of PCI HIPAA The HIPAA Safe Harbor Act amends Subtitle D of the Health Information Technology for Economic and Clinical Health (HITECH) Act act to require the Department of Health and Human Services (HHS) to consider whether organizations have “recognized cybersecurity practices” in place when investigating a data breach, and […]

Share
Read the full article →

Harvard curator examines the worth of a digital work of art

April 6, 2021

From Harvard Gazette: A digital collage of 5,000 images by the artist known as Beeple fetched an eye-popping $69 million at auction last week as a non-fungible token, or NFT, a type of digital file that uses computer networks to prove a digital item’s authenticity, paid for in cryptocurrency. It was a striking sum for something […]

Share
Read the full article →

Exposed admin password leads to massive surveillance camera breach at hundreds of businesses

March 25, 2021

From VentureBeat: This is not good. A small group of hackers viewed live and archived surveillance footage from hundreds of businesses — including Tesla — by gaining administrative access to camera maker Verkada Source: Exposed admin password leads to massive surveillance camera breach at hundreds of businesses | VentureBeat Dental offices are vulnerable to the same […]

Share
Read the full article →

Every Prescription Should be Electronic

February 23, 2021

From AZDA Inscriptions: e-Prescribing can reduce errors. Pharmacists are no longer deciphering handwriting. Phone calls, missed calls and voicemails no longer add steps to the process and the potential for your patient’s prescription getting lost or delayed during the game of “Telephone” AZDA Inscriptions Mandates are in place or on the way to requite eRx […]

Share
Read the full article →

Latest Updates to CS ScanFlow Helps Makes Scanning Faster, More Secure and Sharable

January 19, 2021

Software update from Carestream: Typically, shiny or reflective surfaces, such as metal, full ceramic brackets and crowns and resins, would need to be sprayed with powder or microetched so as not to interfere with the digital scan. However, the new anti-reflective mode optimizes scanning shiny or reflective surfaces, eliminating a step in the process,… …security […]

Share
Read the full article →

Brave Browser Review 2020

December 15, 2020

From Crypto Coin: Future of Private Web Browsing? The internet is an integral part of daily life in many ways. The brave browser offers users a way to browse the internet ad-free, by simply limiting your data exposure to advertisers. Algorithms or algo’s can’t identify you because tracking data is not sent to them, so […]

Share
Read the full article →

If You Connect It, Protect It

November 10, 2020

From Norton: How to live more securely in a connected world: If You Connect It, Protect It The phrase “If You Connect It, Protect It” is a call to secure any object that’s connected to the internet. This applies to the Internet of Things — IoT, for short — everyday objects that can connect to the internet and share data with […]

Share
Read the full article →

September 24, 2020
Share
Read the full article →

How to Clean Up Your Social Media Accounts Without Deleting Them

September 10, 2020

From Gizmodo: Good to know There are many reasons to avoid wanting a social media digital paper trail of your entire life. Maybe there are posts there you think your new employer won’t like, or that your new partner’s parents won’t like, or even ones that you don’t believe in anymore. But wiping the slate […]

Share
Read the full article →

Here’s How Much Your Personal Information Is Selling for on the Dark Web

September 7, 2020

From Experian:  Thank you to Danny Bobrow for the link. Here are the 10 most common pieces of information sold on the dark web and the general range of what they’re worth—or rather can sell for: Source: Here’s How Much Your Personal Information Is Selling for on the Dark Web – Experian You can see there […]

Share
Read the full article →

Tons of news apps caught unnecessarily snooping on iPhone clipboard

August 27, 2020

From Input: It turns out TikTok isn’t the only app that’s snooping through your iPhone’s clipboard (that’s everything you copy and paste). ArsTechnica has discovered over 50 other iOS apps that also unnecessarily read an iOS user’s clipboard, which could include passwords and other private data such as two-factor authentication codes, cryptocurrency wallet addresses, and […]

Share
Read the full article →

Malicious cyber actor using phishing emails to spoof SBA’s COVID-19 relief webpage

August 20, 2020

From CDA: Be cautious. Individuals and small-business owners should watch for suspicious or unexpected emails that appear to be from the Small Business Administration or that direct the recipient to the SBA’s website for COVID-19 relief. The Cybersecurity and Infrastructure Security Agency in an Aug. 12 alert shared Friday by the HHS’ Office for Civil Rights […]

Share
Read the full article →

Think Ransomware Can’t Put You Out of Business?

August 10, 2020

From Inc.com: Yikes! While there’s no shortage of examples of ransomware attacks, a recent study by data protection firm Veritas suggests an even bigger problem that few, if any, companies are prepared for: Customers are increasingly laying the blame on companies, specifically their CEOs, rather than on the hackers perpetrating the attacks. Source: Think Ransomware Can’t […]

Share
Read the full article →

Data breach lawsuit against pediatric dental center dropped, judge cites lack of evidence

July 27, 2020

From Becker’s: The lawsuit, dismissed July 16, alleged that the more than 391,000 patients whose data was affected are facing distress and financial losses due to their personal data being in insecure hands. However, U.S. District Judge Austin Huffaker dropped the case because the plaintiffs could not prove their data had been misused. Source: Data […]

Share
Read the full article →

TikTok: Beneath Its Fun Exterior Lies A Sinister Purpose

June 30, 2020

From Forbes: Disturbing. TikTok is a lesson in irresponsibility, dangerous by design. And not simply by carelessness, mistake or default: this is a deep and patent irresponsibility, a philosophy focused on the constant capture of all kinds of user data. In short, not recommendable for children or adults, particularly thanks to its sinister and addictive […]

Share
Read the full article →

The Internet of Things Has a Consent Problem

June 22, 2020

The Internet of Things (IOT) has a consistent problem with security. From  IEEE Spectrum: IoT companies should tell users what information their devices are gathering and how they’re using it Source: The Internet of Things Has a Consent Problem – IEEE Spectrum Read the whole thing. Most people would be shocked to discover all the […]

Share
Read the full article →

3 Things Can Help Your Office Comply with HIPAA Requirements

June 4, 2020

I contributed to this article in Dentrix Magazine: Dentists wrongly think their practice network is just another piece of equipment, such as a dental chair. It’s delivered, they unbox it, and they get it up and running. They forget that their network is a system that needs to be cared for, upgraded, and supported. Source: […]

Share
Read the full article →