Thanks for printing!  Don't forget to come back to Healthcare Compliance Pros for fresh articles!

The Compliance INSIDER

Activities for reducing the chances of being a victim of Cyber Extortion

Cyber extortion is a crime involving an attack or threat of attack coupled with a demand for money to avert or stop the attack. And according to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) incidents of...

Click Here to Continue Reading!

Tips to Protect & Secure Information When Using Mobile Devices

In the United States, users of mobile devices are spending on average 5 hours per day on our mobile devices. Most of our time, approximately 69% is spent in apps. And there have been a growing number of mobile device users in healthcare. For...

Click Here to Continue Reading!

How Freaked Out Should I Be About Ransomware?

Last week a massive ransomware outbreak impact millions of computers and exposed weaknesses in Microsoft's Windows operating system. The latest attacks are known as "WanaCryptor", "WeCry", or "WeCryptor." Major...

Click Here to Continue Reading!

What Can We Learn From OIG'S Fraud Risk Indicator?

Have you ever wondered how the U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) determines future risk? As it turns out, the fraud risk indicator is OIG’s assessment of the future risk posed by...

Click Here to Continue Reading!