Post by Jaime
>
Health IT - Cybersecurity

Health IT - Cybersecurity

3

 
  
 

Department of
Health and Human
Services

Pr LUE

OCR director urges providers to strengthen cyber posture, risk management

A new HHS blog post provides a glimpse into the focus of OCR’s HIPAA enforcement for the coming year. Entities are being urged to revamp risk management policies and bolster their cyber posture.

https://www.scmagazine.com/analysis/asset-management/ocr-director-urges-providers-to-strengthen-cyber-posture-risk-management

Comments

Zacharias 🐝 Voulgaris

2 years ago #1

For anyone not quite sure what HIPAA is all about, here is a comprehensive web page about it: https://www.cdc.gov/phlp/publications/topic/hipaa.html

More posts from Jaime Contreras, MBA, CISM, CISA

View posts
2 years ago

Cyber for Travel

Jaime Contreras, MBA, CISM, CISA · 8 Free or Cheap Cybersecurity Tips for Travelers · Ready to travel? Let’s talk about how you should prepare for vacation and what steps you can take to protect yourself from cyber criminals. · https://clark.com/travel/cybersecurity-tips-for-travelers/

2 years ago

Medical Device Vulnerabilities

Jaime Contreras, MBA, CISM, CISA · Critical Bugs Expose Hundreds of Thousands of Medical Devices and ATMs · The so-called Access:7 vulnerabilities are the latest high-profile IoT security fumble. · https://www.wired.com/story/access7-iot-vulnerabilities-medical-devices-atms/

2 years ago

Cyber Defense

Jaime Contreras, MBA, CISM, CISA · Cybersecurity: 11 steps to take as threat levels increase | ZDNet · Security agency warns businesses that the cyber-threat level rises when zero days or geopolitical tensions emerge. · https://www.zdnet.com/article/cybersecurity-11-steps-to-take-as-threat-levels-increase/

Related content

2 years ago

Zacharias 🐝 Voulgaris

Cybersecurity Courses to Check Out

Source: pixabay.comOver the past few months, I’ve been working on various mini-courses on Cybersecurity, for a broader audience. Although most of my career I worked in data science-related roles, I have studied Cybersecurity quite a bit and even did some PhD-level research on it, ...

2 years ago

Judy Caroll

Cyber Security Lead Generation: Where and How To Look for New Leads in 2021

   Cyber security lead generation is a niche B2B market with its own rules meaning not every single marketing tactic in the hat is going to work for the market. · However, by understanding the target customers, there are plenty of opportunities for marketers to leverage the uniqu ...

2 years ago

Zacharias 🐝 Voulgaris

Facebook's Recent Issues and the Need for More Privacy

Source: pixabay.com · Brief Overview of What's Happened · It’s no secret that Facebook has been on a losing streak lately. Not something you would expect from a prestigious tech company that’s become a household name for years now. Then again, we live in bizarre times where lots ...

2 years ago

Vlad Nov

Vlad Nov - Guide to Cybersecurity Planning For Business

#Cybersecurity programs incorporate a variety of processes and tools designed to help organizations deter, detect, and #blockthreats. Contact VladNov for more info! ·  

2 years ago

Jaime Contreras, MBA, CISM, CISA

Cyversity Membership

Become a Member · Building Diversity & Inclusion into the Fabric of Cybersecurity · The stakes within cybersecurity have never been greater. The need for diversity among the professionals entrusted with guarding our technology infrastructure has never been more evident or critic ...

2 years ago

Jaime Contreras, MBA, CISM, CISA

Cyber Defense

Cybersecurity: 11 steps to take as threat levels increase | ZDNet · Security agency warns businesses that the cyber-threat level rises when zero days or geopolitical tensions emerge. · https://www.zdnet.com/article/cybersecurity-11-steps-to-take-as-threat-levels-increase/

Related professionals

You may be interested in these jobs

  • ManTech International Corporation

    Information Systems Security Engineer

    Found in: Lensa US 4 C2 - 1 day ago


    ManTech International Corporation Stafford, United States Full time

    Secure our Nation, Ignite your Future · The Information Systems Security Engineer (ISSE) III performs activities associated with the maintenance and updates of software in response to IAVAs, patches, and version updates IAW program requirements and associated vendor licenses. Pr ...

  • Cycle Gear

    Sales Associate

    Found in: Lensa US 4 C2 - 17 hours ago


    Cycle Gear Austin, United States

    **Sales Associate** · 9070 Research Blvd, Austin, TX 78758, USA · Part-time · Department: Store Operations · **Company Description** · **$ $17.00 / Hour** · Comoto Holdings is Americas largest and fastest-growing omnichannel platform in the powersports aftermarket-products ...

  • Turner Food & Spirits Co.

    Line Cook Cotton Exchange

    Found in: Lensa US 4 C2 - 3 days ago


    Turner Food & Spirits Co. Savannah, United States

    The Cotton Exchange is seeking a full time, high volume, experienced line cook. · Responsibilities of a Cook: · •Maintaining a sanitized and well-organized kitchen. · •Preparing workstations for cooking. · •Checking the quality of the ingredients. · •Preparing cooking ingred ...