As always, GSG here to help answer any questions and of course help you with a Security Risk Assessments, Information Security Policies, BA Agreements, and more.
This article from xtelligentmedia contains a lot of great information regarding data breaches. It does a great job in laying out the steps to follow in a variety of circumstances.
GSG Compliance often is asked about the “how, when, and why” regarding breaches of PHI. While there are many circumstances that have led to a breach of some kind, this article makes an easy read of what to do to prevent them and what to do should one occur. There is no one thing to do to protect your data, but there are some basic and common tasks that will put a covered entity in a much better defendable position.
“How To Comply with the HIPAA Breach Notification Rule”
- Steps to take when a breach happens or suspect of a breach
- Cyber incidence response
- Significance of Encryption
877-270-8306 ext. 133