Blog

Ballast Software FAQs

If you have questions or need support, contact the BALLAST… Read more »

Blog

Evolving Cyber Security Threats in Healthcare

Attention healthcare organizations! Learn some key areas to consider for your risk assessment this year.

Blog

HIPAA Security Compliance and OCR Audits

Here are the basics for you to keep in mind as you examine the rules and make your decisions about getting ready for the upcoming OCR audits.

Blog

Beware: Myths about Data Security and HIPAA Compliance

A critical first step in putting a compliant data security solution in place is separating fact from fiction. This article covers four common misassumptions you’ll want to know.

Blog

HIPAA Security Compliance: How risk tolerant are you?

By going beyond HIPAA security compliance and examining the underlying risks that the controls address, it’s easier to make decisions in an otherwise ‘loosely’ defined set of regulations.

Blog

Data Security: Building a Good Mobile Device Security Policy

Why worry about a mobile device security policy? Let’s discuss establishing a good set of organizational policies related to mobile computing devices.

Blog

OCR Audit Preparation Checklist for Healthcare

The OCR HIPAA Audit program is designed to analyze processes, controls, and policies of selected covered entities and business associates. The OCR has established a comprehensive audit protocol that contains the requirements to be assessed through these performance audits.

Resource

PODCAST: 2017 Year-End Healthcare Breach Review

In this podcast, LBMC Information Security’s Mark Fulford offers some leading theories for these statistics, as well as a quick rundown of the top five healthcare data breaches from 2017.

Blog

Understanding Cybersecurity and Cybersecurity Insurance

While cybersecurity insurance can help protect organizations after a data breach, it should never be a substitute for cybersecurity and risk management.

Blog

4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.