It’s that time of the year again – summer! Everyone is out enjoying the warm weather, going to the beach or, for all you bookworms, getting a jumpstart on your summer reading list. I can remember at the end of each school year my teachers would send me a long list of books to read over the summer months to keep my brain fresh for the following September. I thought it would be a good idea to put together a
2004 marked the beginning of new technologies and companies that
changed the consumer experience as we know it. Companies today must meet the
growing needs of consumers, while safely securing personal data. Let’s take a
look back at some of the companies that were founded in 2004 and see how their
technology has impacted consumerism and security in healthcare.
When Mark Zuckerberg started Facebook in his college dorm room, little did he know he was starting a company that would change the way people
I think I can speak for everyone when I say I can’t wait for spring to finally arrive. After a long, cold winter, April brings hope for warm weather, outdoor activities and for some, planning for an upcoming summer vacation. With just a few clicks, you can search and plan an entire trip on an online travel website and book the dream vacation for you and your family in minutes.
Unfortunately, the new reality with all online data is that it
Every month, the Payer Security Focus will break down a different topic in security and compliance with information relevant to payers and actionable steps to help build a more robust security and compliance program at their organizations. This month’s topic is PCI DSS.
What is PCI?
PCI DSS stands for Payment Card Industry Data Security Standards and applies to all entities involved in payment card processing, including merchants, processors, financial institutions and service providers. It also applies to all other entities that
This time of year, my wife and I receive many cards and messages from family and friends wishing us happy holidays. These messages bring a lot of joy and remind us how lucky we are to have so many special people in our lives. Most of these messages come in the mail (they’re really the only important pieces of physical mail I receive these days), but some of my friends send their holiday greetings electronically.
Thirty years ago, the general public
In response to a string of large-scale data breaches impacting U.S. consumers in recent years, InstaMed Security Officer Noah Dermer contributed a piece for the HBMA publication, RCM Advisor. Dermer’s article explores why protecting payment data must be a top priority for billing services, especially as security risks and patient payment responsibility both continue to increase in healthcare.
When you think of a hacker, what comes to mind? Do you picture someone dressed as a burglar sitting at a desktop computer in a dark room? If you do, then it’s time to reconsider that idea. For this month’s security focus, we’re going to talk about social engineering and how it turns the hacker stereotype on its head.
Social engineering is a non-technical method of human intrusion that relies on human interaction and often involves tricking people into divulging confidential
If you’re like me, you feel a small sense of accomplishment when you leave your doctor’s office with a clean bill of health after an annual check-up. Did you know that InstaMed has to go through an annual check-up, too? We’re happy to say we recently passed our annual health checks for both our Point-to-Point Encryption (P2PE) v2.0 Validated Solution and HITRUST, so you can rest assured that we’re continuing to keep data safe and secure.
Both the Payment Card Industry
Ransomware is a type of malicious cyberattack that has grown in notoriety and frequency in recent years. Like kidnapping, ransomware works by taking something valuable to an organization – such as data files – and holding it hostage until a ransom is paid.
Ransomware infiltrates an organization’s system by infecting someone’s computer with a virus, which is likely accomplished by tricking that person into clicking a link or downloading a file in a phishing email. These emails are disguised as a
How do you prioritize security at your healthcare organization? A lack of focus on security spending is a challenge in healthcare compared to other industries. According to data from the HIMSS Analytic Healthcare IT Security and Risk Management Study, less than 6% of a healthcare organization’s IT budget is allocated to IT security, which is significantly lower compared to other industries. It’s possible that security has been deprioritized to focus on other efforts that streamline operations or bring in revenue.