Is Stripe HIPAA Compliant?
Stripe is not HIPAA compliant and – other than its payment processing services – should not be used by covered entities and business associates to create, collect, store, or transmit Protected Health Information (PHI). Stripe does not need to comply with HIPAA for payment processing services due to HIPAA exempting financial transactions from the requirements of the Administrative Simplification Regulations. Despite the exemption, businesses may be restricted in how they can use the payment processing services due to Stripe’s Terms and Conditions. What is Stripe? Stripe is primarily a payment processing platform that enables businesses to collect payments from a customer via a wide range of payment options (credit card, ACH transfer, Apple Pay, Bitcoin, etc.). Businesses can integrate the Stripe API into an online store or app, subscribe to a plan that supports in-person card processing, and/or purchase card readers with tap to pay capabilities. As well as its payment processing activities, Stripe provides billing, identity verification, and fraud management services. The company...
Increase Staff Productivity & Reduce No-Shows With Better Patient Engagement
Healthcare organizations of any size can streamline workflows, increase staff productivity, maximize revenue and reduce no-shows by up to 90% as benefits of patient engagement technology. Patient-centric functionality enhances patient communications with automation, including appointment notification and reminders, online patient scheduling, waitlist management with last-minute cancellation fulfilment, patient experience surveys, and many other features. These can significantly enhance your patients’ perception and experience of your practice. Typically, HIPAA compliant patient engagement systems integrate easily with all existing practice management software and have a fast return-on-investment. Surveys Show Patients Appreciate Patient Engagement Technology Healthcare providers have been slow to adopt communication technology, but according to an Accenture Survey, 60% of patients prefer to use technology for patient-provider communication. This is in part because the Covid crisis altered patient behaviors and expectations of technology usage in healthcare practices. Patients...
Meridian Behavioral Healthcare Discloses 99,000-Record Data Breach
Data breaches have recently been reported by Meridian Behavioral Healthcare, Network 180, Erie VA Medical Center, and Fred Hutchinson Cancer Center. Meridian Behavioral Healthcare Meridian Behavioral Healthcare, Inc. in Florida has recently confirmed that protected health information was exposed in a security breach that was detected on August 11, 2023. Third-party cybersecurity specialists were engaged to investigate the breach and on December 4, 2023, confirmed that 98,808 individuals had been affected. Written notifications were mailed on December 22, 2023. The information exposed in the breach varied from individual to individual and may have included names, addresses, Social Security numbers, dates of birth, medical diagnosis and treatment information, health insurance information, and prescription information. Meridian Behavioral Healthcare said it is not aware of any misuse of patient data but has offered the affected individual complimentary credit monitoring services. Additional security measures have been implemented within its network, and data security policies and...
Hospital IT Help Desks Targeted in Sophisticated Payment Fraud Scam
U.S. hospitals are being targeted by cybercriminals in a sophisticated payment fraud scam, according to the American Hospital Association (AHA). The AHA has received multiple reports of scammers contacting hospital IT departments to perform password resets and enroll new devices to obtain multifactor authentication (MFA) codes. Once access has been gained to employee email accounts, they send instructions to payment processors to divert legitimate payments to attacker-controlled U.S. bank accounts. The funds are then transferred to overseas accounts. According to the AHA, scammers contact IT departments and pose as revenue cycle employees or other employees in sensitive financial roles. They provide stolen personal information to verify their identity to pass the security checks that are necessary to perform a password reset to enroll a new device to receive MFA codes. The devices used to receive the codes often have a local area code. With a new device enrolled, the scammer will receive MFA codes, allowing them to access employee email accounts. This technique also allows the...
Citrix Patches 2 Actively Exploited NetScaler ADC and Gateway Zero Days
Two zero-day vulnerabilities have been identified in customer-managed Citrix NetScaler Application Delivery Controller and NetScaler Gateway devices that are being exploited in the wild. The vulnerabilities are present in the NetScaler management interface can be exploited in unpatched devices that are exposed to the Internet. The Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerabilities to its Known Exploited Vulnerabilities Catalog, and while attacks have been limited, CISA warns that the vulnerabilities are frequent attack vectors for malicious cyber actors and exploitation is likely to increase in the coming days. In December, Citrix released an advisory about a vulnerability dubbed CitrixBleed (CVS-2023-4966) which has been extensively exploited by ransomware groups. As such, CISA has advised all federal agencies to ensure the patches are applied as soon as possible and at most within a week. The two recently disclosed zero-day bugs are unrelated to CitrixBleed. CVE-2023-6549 is a high-severity buffer overflow vulnerability with a CVSS base score...



