Articles Tagged With: breaches
-
Good computer logs critical to detecting breach
A detailed record of who accessed data, when, and how often might be the only way an organization can trace the source of a HIPAA breach. Ensuring the thoroughness of those logs should be a top priority for any healthcare organization.
-
Blue Cross Blue Shield employees charged with taking and sharing data screen shots
Eleven people have been charged after a Blue Cross Blue Shield of Michigan (BCBSM) employee allegedly printed and shared screen shots of more than 5,000 subscriber profiles. The 11 people are charged with identity theft and credit card fraud, in what some observers are calling an example of how criminals can get past even the best HIPAA security measures.