Remove types-of-information-security-incidents
article thumbnail

HHS Reports to Congress on HIPAA Compliance and Breach Notifications

ThomsonReuters

The top five issues alleged in the complaints resolved in 2021 involved (1) impermissible uses and disclosures; (2) right of access; (3) safeguards; (4) administrative safeguards (security rule); and (5) breach notice to individuals. Below are highlights of both reports: Compliance Report. OCR did not initiate any audits in 2021.

article thumbnail

SEC Public Company Cybersecurity Disclosure Proposed Rules: Your Top Questions Answered

Audit Board

Securities and Exchange Commission (SEC) recognizes the importance of this information, and in an effort to increase transparency it has proposed new cybersecurity disclosure rules for public companies. Previously undisclosed individually immaterial cybersecurity incidents that have become material in the aggregate.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS Investigation of Business Associate Results in $350,000 Settlement

ThomsonReuters

The investigation indicated that the business associate disclosed more than 230,000 individuals’ ePHI, failed to enter into a business associate agreement with a subcontractor, and did not conduct a security risk analysis or implement a management plan to determine and address vulnerabilities of ePHI across the organization.

article thumbnail

IT Risk Assessment Fundamentals and Best Practices

Audit Board

When completed in a methodical and well-scoped manner, IT risk assessments can be an extremely valuable tool for many stakeholders across the organization, including enterprise risk, audit, compliance, and security departments. Such insights make the treatment and remediation of risks much easier and more effective.

article thumbnail

To Find a Cybersecurity Solution for Everyone, We First Need to Admit Cybersecurity Is Everyone’s Problem

Audit Board

Organizations want to better prepare for and defend against cyber attacks, but they’re not getting the information they need to do it. . Organizations aren’t incentivized to share information, and it’s human nature that they don’t like exposing their own problems. What Is the Securing Open Source Software Act (SOSSA)?

article thumbnail

Managing Third-Party Relationships: Effective Approaches to TPRM Risk and Compliance

Audit Board

SolarWinds, Log4j, Kaseya: All are security incidents that have been in the headlines over the past several years; all are security incidents that resulted from third-party breaches. In the past year alone, organizations have had numerous serious threats to navigate, including incidents at GitHub and Toyota.

article thumbnail

A Comprehensive Look at the NIST Cybersecurity Framework

Audit Board

There’s ISO , the International Organization for Standardization; the AICPA (now AICPA-CIMA), the American Institute of CPAs and the Chartered Institute of Management Accountants; CISA , the Cybersecurity and Infrastructure Security Agency; and NIST , the National Institute of Standards and Technology.