Semel Cybersecurity & Compliance Consulting

Contact:
Email:
Social:
Mike Semel

Are your cloud services really compliant with HIPAA and other regulations?

Mike Semel- Recorded Session


Does your organization collect and share consumer health information? When it comes to privacy, you’ve probably thought about the Health Insurance Portability and Accountability Act (HIPAA). But did you know that you also need to comply with the Federal Trade Commission (FTC) Act? This means if you share health information, it’s not enough to simply consider the HIPAA Privacy Rule. You also must make sure your disclosure statements are not deceptive under the FTC Act.


CYBERSECURITY – VOICE IS DATA. IS YOURS PROTECTED?

Mike Semel- Recorded Session


COVID-19 has exposed cybersecurity issues with popular web meeting tools. What about the phone system? Digital voice recordings, voice messages, and recorded web meetings need to be secured and compliant with regulations. VOIP is nothing more than an on-premise or cloud-based computer system that needs the same security considerations as sensitive databases and document storage. Cybersecurity and compliance expert Mike Semel will help you leverage security as a competitive advantage.

Explore Mike's Blog Articles

Cybersecurity Policies are Finally Put Where They Belong – Last

Blog Article

This guidance looks at top threats against healthcare organizations, including phishing e-mails, ransomware, loss/theft of devices or data, insider.. →

Are You Investing Enough in IT Security?

Blog Article

Would you put a $ 10 fence around a $ 100 horse? Does it make sense to put a $ 100 fence around a $ 10 horse? For the right security, you need to.. →

The 7 HIPAA Audit Items the Feds Selected

Blog Article

On July 11 letters were sent BY E-MAIL ( check your junk mail folders! ) to 167 health plans, health care providers, and health care clearing houses.. →

Security & Compliance are Executive Responsibilities

Blog Article

You can deal with Security and Compliance at the executive level now, and invest adequate attention and resources, or you can deal with it later.. →

Search/Sort
Post Subtypes
Topics
Mike Semel Session 2 Slides Mike Semel Session 2 Slides

Documents
Documents
0 Documents-Documents jplist-topic-Cybersecurity 0 365443 365443

Mike Semel Session 2 Slides

Documents

Mike Semel Session 1 Slides Mike Semel Session 1 Slides

Documents
Documents
1 Documents-Documents jplist-topic-cloud jplist-topic-Hipaa 0 365442 365442

Mike Semel Session 1 Slides

Documents

Curing Common HIPAA & EHR Spelling Headaches Curing Common HIPAA & EHR Spelling Headaches

Article
Article
2 Article-Article jplist-topic-Hipaa jplist-topic-ehr jplist-topic-mike jplist-topic-semel jplist-topic-Cybersecurity 0 360893 360893

Curing Common HIPAA & EHR Spelling Headaches

Article

Security & Compliance are Executive.. → Security & Compliance are Executive.. →

by Mike Semel

You can deal with Security and Compliance at the executive level now, and invest adequate attention and resources, or you can deal with it ...

Blog Article
Blog Article
3 Blog-Article-Blog-Article jplist-topic-Mike-Semel jplist-topic-security jplist-topic-compliance jplist-topic-HIPPA 0 356209 356209 You can deal with Security and Compliance at the executive level now, and invest adequate attention and resources, or you can deal with it later trying to explain to an angry public why you had a data breach or an IT security crisis.

Security & Compliance are Executive Responsibilities

Blog Article

You can deal with Security and Compliance at the executive level now, and invest adequate attention and resources, or you can deal with it later ...

The 7 HIPAA Audit Items the Feds Selected The 7 HIPAA Audit Items the Feds Selected

by Mike Semel

On July 11 letters were sent BY E-MAIL (check your junk mail folders!) to 167 health plans, health care providers, and health care clearing ...

Blog Article
Blog Article
4 Blog-Article-Blog-Article jplist-topic-Mike-Semel jplist-topic-HIPPA jplist-topic-Audit jplist-topic-compliance 0 356177 356177 On July 11 letters were sent BY E-MAIL (check your junk mail folders!) to 167 health plans, health care providers, and health care clearing houses (all HIPAA Covered Entities notifying them that they have to send in documentation for a ‘desk audit.’ They will have 10 days to send in the required materials for review.

The 7 HIPAA Audit Items the Feds Selected

Blog Article

On July 11 letters were sent BY E-MAIL (check your junk mail folders!) to 167 health plans, health care providers, and health care clearing houses ...

Are You Investing Enough in IT Security? Are You Investing Enough in IT Security?

by Mike Semel

Would you put a $ 10 fence around a $ 100 horse? Does it make sense to put a $ 100 fence around a $ 10 horse? For the right security, you ...

Blog Article
Blog Article
5 Blog-Article-Blog-Article jplist-topic-Mike-Semel jplist-topic-IT-Security jplist-topic-Cybersecurity 0 356154 356154 Would you put a $ 10 fence around a $ 100 horse? Does it make sense to put a $ 100 fence around a $ 10 horse? For the right security, you need to know what your horse is worth. The same concepts apply to protecting your data. What is your data worth?

Are You Investing Enough in IT Security?

Blog Article

Would you put a $ 10 fence around a $ 100 horse? Does it make sense to put a $ 100 fence around a $ 10 horse? For the right security, you need to ...

Cybersecurity Policies are Finally Put Where They.. → Cybersecurity Policies are Finally Put Where They.. →

by Mike Semel

This guidance looks at top threats against healthcare organizations, including phishing e-mails, ransomware, loss/theft of devices or data, ...

Blog Article
Blog Article
6 Blog-Article-Blog-Article jplist-topic-Cybersecurity jplist-topic-Mike-Semel jplist-topic-HIPPA 0 356153 356153 This guidance looks at top threats against healthcare organizations, including phishing e-mails, ransomware, loss/theft of devices or data, insider threats, and connected medical devices. Cybersecurity practices to prevent each are clearly defined and broken down into understandable steps.

Cybersecurity Policies are Finally Put Where They Belong – Last

Blog Article

This guidance looks at top threats against healthcare organizations, including phishing e-mails, ransomware, loss/theft of devices or data, insider ...

No results found