Tag Archives: technology

Minimizing Secure Email Hassles for Your Portal Users

In this day and age of password overload all of us are having issues with email users logging into our secure email portals.

Infrequent use of tools like your RadarMail 360/Zix email encryption makes this problem even more frequent.

User error  is 100% of the problems here but to help minimize the issues for people we have implemented the following for our RadarMail 360 shared portal and all of our client’s branded portals if they have authorized it.

1) Simplifying passwords to the bare minimum – 6 characters with no number, letter, Caps requirements

2) Add this text re: password Reserts – “If you are locked out click here to Reset your password.”

3) “Remember Me” – add to the portal to allow users to decide if they want their login name saved

4) Change the link for “Online Help” to “Online Help/FAQs” with this link with more specific FAQ help:

http://www.zixhelp.com/zixport/3.7/en/webhelp/portalhelp.htm

Avoiding Client Spam Filters

When a user is not getting the emails from you or from resetting their password this is a client network spam filter issue or client browser same filter issue – NOT A ZIX ENCRYPTION ISSUE.  To solve this issue be sure that the client has the following domain in their network and Outlook whitelist:smtpout.zixmail.net – which is IP addresses 63.71.8.100 through 63.71.8.109 for inbound mail.

Online Resources

User Browser Options

Short of a user getting on the Zix Network at the user level I would recommend having users review secure browser capabilities and addons in the context of their own company computer, browser, network and HIPAA HITECH security policies.

Depending on the sophistication of the user they can enable login/passwords being remembered in their browsers. If used properly this is the easiest solution but potentially the least secure if used wrong :

Firefox – go to Tools|Options|Security and you can enable saving passwords as well as a “master” password to protect use by an unauthorized user. Best, most secure and easiest to use.

  • Other free browser Addons can be reviewed here:

https://addons.mozilla.org/en-US/firefox/search/?q=form+fill&cat=all&lver=any&pid=1&sort=&pp=20&lup=&advanced=

IE 8 – Tools | Internet Options | Content | Auto Complete – no master password so less secure

Chrome – Click on the “wrench” icon on the upper right corner | Options | Personal Stuff | Form Autofill – NO master password option makes this insecure

Safari– Preferences | Autofill | Allow login/passwords – no master password makes this insecure.

Opera – Menu Tab | Settings | Preferences | Forms | Password Manager – no master password makes this insecure

Implementing an appropriate solution will not only help with your HITECH compliance activities but a user’s use of the web in general.

If these resources do not help your users then there is really nothing further to be done for them.

As the old adage says, “you can lead a horse to water but you can’t make them drink.” 🙂

Caution – Any of these actions should be reviewed by a user in the context of their corporate security and HIPAA HITECH privacy policies and the links provided by The Industry Radar/RadarMail 360 are solely for information purposes only.

Leave a comment

Filed under Brokers, Compliance, Healthcare, HIPAA, HITECH

Insurer Denies $3.3M Data Breach Payment Due to BA Negligence

If this were your client where would find $3.3 million dollars to settle their claim let alone the penalties that HHS will apply?

You can read the details here of Colorado Casualty vs. University of Idaho / Perpetual Storage.

Bottom line is that most standard policies do not cover cyber losses and neither does your E&O policy as we have written about before.

“At the same time, the University is seeking in its lawsuit to bring its insurance broker and adviser into the litigation, alleging they were “careless, negligent, and made various negligent misrepresentations about Perpetual’s insurance coverage from Colorado Casualty.”

Aon reviews this case from an insurance perspective here.

Preventing breaches in the first place is key by getting compliant and encrypting ALL data whether “at rest” or “in motion”.

Lesson – your business and livelihood is one mistake away from disappearing if you are not compliant.

We can help you quickly and cost effectively….contact us now

1 Comment

Filed under Brokers, Compliance, Healthcare, HIPAA, HITECH

New HITECH Rules (NPRM) – Total Clarity for Brokers as BA’s

” Business Associates Get HIPAA Alert” – This post by Rebecca Herold and other privacy experts hit the highlights of this major change here.

We add specifics for brokers below.

The End of the Status Quo

I have been baffled at the lack of compliance I am seeing the market from brokers of all sizes.

It seems that many of you were confused by HITECH and others simply do not believe it will be enforced and many simply were playing Ostrich trying to ignore the law.

Yesterday HHS released clarifications (243 pages of mind numbing reading) of HIPAA HITECH that should end any speculation for a broker what the expectations, requirements and penalties for non compliance are.

We have pulled out relevant quotes for you to review but the bottom line is that your are fully accountable for compliance in the protection of PHI in your possession in any form and for the compliance of your employees and any subcontractors you might have that touch PHI. Penalties for non compliance are step and can be both civil and criminal and will be enforced.

Lets start with what HITECH is really all about…

HITECH is About Healthcare Reform and Cost Containment

“.. Department of Health and Human Services (HHS or The Department) guiding principles is that the benefits of health IT can only be fully realized if patients and providers are confident that electronic health information is kept private and secure. HHS’s goal…is to improve the nation’s health care system by enabling health information to follow the patient wherever and whenever it is needed…to ensure that this electronic exchange of health information is built on a foundation of privacy, and security.”

Comment – This is about healthcare reform and creating an electronic infrastructure that can be trusted like we trust the ATM, banking and credit card networks and will drive quality up and costs down more than almost anything else that can be done in the short (3-5 yr) term

Commitment

“Administration-wide commitment to make sure no one has access to your personal information unless you want them to…  that supports building Americans’ rights to consent and control over PHI into electronic health systems and data exchange.”

Comment – these rules are here to stay and states also are creating their own

Business Associates = Covered Entities = Same Rules = Same Penalties

“The proposed rule would extend liability for failure to comply with the Privacy and Security Rules directly to business associates and business associate subcontractors in a manner similar to how they now apply to covered entities. The proposed rule would subject business associates to many of the same standards and implementation specifications, and to the same penalties, that apply to covered entities under the Security Rule and to some of the same standards and implementation specifications, and to the same penalties, that apply to covered entities under the Privacy Rule.”

Comment – For the system to work ALL players – large or small- have to be held accountable to the same standards. If there were any questions as to whether BA’s were subject to the same rules as carriers this ends that.

BA=BA Subcontractors=Same Rules = Same Penalties (NEW)

“Additionally, business associates would also be required to obtain satisfactory assurances in the form of a business associate agreement from subcontractors that the subcontractors will safeguard any protected health information in their possession. If the business associate learns of a pattern of activity or practice of a subcontractor that constitutes a material breach or violation of the contract, the business associate would be required to make reasonable attempts to repair the breach or correct the violation. If unsuccessful, the business associate would be required to terminate the contract, if feasible. In addition, a business associate would be required to furnish any information the Secretary requires to investigate whether the business associate is in compliance with the regulations.”

Comment – Just like a carrier is ultimately on the hook for BA behavior, you are on the hook for anyone you work with using PHI being compliant.

What Compliance Means:

“We assume that business associates in compliance with their contracts would have already:

  1. designated personnel to be responsible for
  2. formulating the organization’s
    1. privacy and
    2. security policies,
  3. performed a risk analysis, and
  4. invested in hardware and software to prevent and monitor for
    1. internal and
    2. external breaches of protected health information.”

Comment – These 4 clear steps are what is expected of all BA’s, CE’s and subcontractors of the BA (new rule)

Contractual Compliance Accountability

“We expect that most business associates make a good-faith effort to follow the terms of their contracts and comply with current security and privacy standards.”

Comment – If you have signed BA agreements with your clients and insurers your compliance is assumed and expected.

Legal and Financial Consequences Clarified

“For those business associates that have not already adopted HIPAA-compliant privacy and security standards for protected health information, the risk of criminal and/or civil monetary penalties may spur them to increase their efforts to comply with the privacy and security standards.”

Comment – Failure to be compliance to meet your contractual obligations are subject to both criminal and civil penalties

Expectations for Getting Compliant

Regardless of the reason, to avoid the risk of the far more serious penalties in this proposed rule, we expect that business associates and subcontractors that have been lax in their complying with the privacy and security standards may now take steps to enhance their security procedures and strengthen their policies for protecting the privacy of the protected health information under their control.

Comment – Clear direction that getting compliant is NOT an option

No “Turtle” Defense

“Moreover, a covered entity or business associate cannot assert an affirmative defense associated with its “lack of knowledge” if such lack of knowledge has resulted from its failure to inform itself about compliance obligations or to investigate received complaints or other information indicating likely noncompliance.”

Comment – Hiding in your shell. i.e. Ignorance real or pretended will not be defense against criminal and civil penalties

You Own Your Organization’s Behavior

“A business associate is liable, in accordance with the federal common law of agency, for a civil money penalty for a violation based on the act or omission of any agent of the business associate, including a workforce member or subcontractor, acting within the scope of the agency.”

Comment – You own any issues coming out of your employees behavior so train them well.

Specific Rules for Security and Privacy

“A covered entity or business associate must comply with the applicable standards, implementation specifications, and requirements of this subpart with respect to electronic protected health information of a covered entity.”

Comment – No option in meeting the standards

Administrative Standards Clarified

“Administrative safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s or business associate’s workforce in relation to the protection of that information.”

” A covered entity or business associate must, in accordance with § 164.306:

(A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate.

(C) Sanction policy (Required). Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the coveredentity or business associate.

(2) Standard: Assigned security responsibility. Identify the security official who is responsible for the development and implementation of the policies and procedures required by this subpart for the covered entity or business associate.

Comment – Clarity!

Physical Safeguards Clarified

Physical safeguards are physical measures, policies, and procedures to protect a covered entity’s or business associate’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.

Comment – Clarity!

Security Standards Apply to BA’s Just Like CE’s

Ҥ 164.306 Security standards: General rules.

(a)  General requirements. Covered entities and business associates must do the following:

(1) Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity or business associate creates, receives, maintains, or transmits.”

Comment – Clarity!

New Privacy Website Launched

http://www.hhs.gov/healthprivacy/index.html

Comment – all the details are and will be here

Action Steps

Your business is dependent upon trust and relationships and if a major breach occurs due to your lack of compliance your business and livelihood will be gone.

Getting your house in order with a risk assessment, the proper policies and procedures and the encryption needed to protect PHI is not that hard or expensive with our Compliance Radar and RadarMail 360 solutions.

Let us help you….

Leave a comment

Filed under Brokers, Compliance, Healthcare, HIPAA, HITECH

Hardest Working Male Benefits Consultant Spotted at Hub!

The HWMBC out working everyone all over the world with Hub International!

How come Gallagher is only using the 2nd HWMBC on their site? They are a bigger company! 🙂

Leave a comment

Filed under Brokers, Marketing, Websites

Second Hardest Working Male Benefits Consultant Spotted – At Gallagher!

I just found where the 2nd hardest working benefits consultant really works – Gallagher Benefits!!

I know this is not Jim Durkin as I have met Jim in the past!! 🙂

Here he is!!

Stock photography in today’s digital world makes no sense, especially for large organizations like Gallagher.

1 Comment

Filed under Brokers, Marketing, Websites

Client ID Theft in GA – Why You Need to Encrypt Your Email And Data

We have been writing for months about the needs that all brokers have under HIPAA HITECH to get compliant and encrypt their data at rest and in motion (email). Here is a real breach, involving the Blues here in GA that has caused financial harm to a policyholder:

“Allison Boyd discovered her identity had been stolen at the same time she got a form letter from Georgia Blue Cross Blue Shield telling her of a security breach into their database.

70,000 Georgia Blue Cross Blue Shield customers got the same letter.

Ms. Boyd figured she was a victim of the compromised database.

“I received 3 credit cards in the mail that had been opened in my name and then the existing account, I looked up my account online and I noticed fraudulent charges had been made,” Boyd said.

ID thieves have already racked up $6,000 in charges at big chain stores in 3 states.

“It’s disturbing, it’s very frustrating, and it’s stressful,” she said.” 11 Alive Report

So yes the threat is real and you do not want your firm to be any part of this type of breach and the negative publicity associated with it.

Jeff McCart, president of  The McCart Group, an Assurex member and one of  Atlanta’s premier insurance brokers, says €œData loss is the #1 balance sheet risk a company faces€. He goes on to say, €œCompanies need to add breach notification coverage, cyber coverage, victim monitoring coverage and comprehensive crime coverage insurance to their general liability policies in order to protect themselves€.

The large health insurers can survive this negative press. Your business will die because of it.


Leave a comment

Filed under Brokers, Compliance, Healthcare, HIPAA, HITECH

Brokers using LinkedIn, Social Media and Zix Email Encryption

We have gotten a lot of inquiries from our website reviews on who is using social media like LinkedIn, Twitter, Blogging et al.

We created this page to give you at least some sense of that and have posted before on the 110+ brokers tweeting and over 50 blogging, whose tweets/posts we review daily now for inclusion on our news sections.

We are also now following 110+ firms on LinkedIn as well so if they provide updates of value we can include them in the news for all to share.

Finally we have done a fair bit of research online to determine what firms are using industry leader ZixCorp’s email encryption solutions for HIPAA HiTECH compliance and that list with links is on this page as well. While this is only a partial list that we could research online it definitely sends a message on who has chosen Zix.

We clearly are biased when it comes to the Zix solutions as they power our RadarMail360 Suite but as you can see from this list the quality of the firms using Zix is impressive averaging a Industry Radar website rating of nearly 3 while our list as a whole averages just over 2.

When you add these firms to the 150++ insurers that use Zix as well including CIGNA, Anthem, WellPoint, Humana, Coventry, Assurant and over 30 Blues plans Zix sets the standard for the employee benefits industry.

There does seem to be a pattern of firms that have higher ranking websites, trying social media and using encryption from Zix. What do they know that you don’t?

Leave a comment

Filed under Brokers, Compliance, HIPAA, HITECH

The Second Hardest Working Male and Female Benefits Consultants in America

Our first posts on the busiest male and female benefits consultants were so popular I thought I would share the runners up who each appear in at least 10 websites. These 2 actually appear in the same website as well…..PLEASE spend a few bucks on a good photographer and use real photos on your site! It makes a huge difference in the appeal it makes to your viewers..

2 Comments

Filed under Brokers, Marketing, Websites

Brokers Who are Blogging – Updated

We have created a combined RSS feed for all the brokers we have found who are blogging and whose posts we review for inclusion in The Industry Radar news and newsletters. The list below of 40 firms is worth checking out.

If your firm is blogging and not on this list let me know and we will add you in:

  • American Benefits
  • IBP
  • Argus Benefits
  • Intercare
  • Benefit Resource
  • JLBG
  • Benemax
  • Johnson Dugan
  • Bluewater Benefits
  • Kushner
  • BSG
  • Longfellow
  • BW Administrators
  • Managed Benefits
  • CA Benefits
  • Moore Benefits
  • Clark and Lavey
  • Moreton Blog
  • Coordinated Benefits
  • Ovation
  • Corporate Synergies
  • Precept
  • Dean and
  • Savitz
  • Discovery Benefits
  • Senn Dunn
  • Employers RX
  • Shargel
  • Findlay Davies
  • Sitkins
  • Findley Blogs
  • Smith Buckley
  • Findley Davies
  • Thomas Gregory
  • Hartwig Moss
  • WGA
  • Horton
  • Wischmeyer
  • Houze
  • Alan Katz

2 Comments

Filed under Brokers, Marketing, Websites

What the Top 40 Website Winners Know That You Don’t…On Email Encryption

One of the main ideas behind our Top 40 listings is that firms that pay more attention to their web marketing are likely more strategic and business savvy that much of their competition.

In reviewing these firms earlier  today I tested this idea to see who among them had adopted the premier HIPAA HITECH email encryption solution from Zixcorp that power our RadarMail 360 offering.

While 14/40  – 35% – are using Zix’s rules based Gateway solution for outbound email only 10/40 – 25% –  have a branded client portal for clients to send inbound PHI to their firm.

Our top 2 winners – Blue Water Benefits and McGohan Brabender both use the Zix Gateway and Client Portal as does #5 – William Gallagher. Hmmm…Aon uses Zix as well as 150+ insurance carriers …

These figures are much higher than the survey as a whole and reflect the fact that these organizations do their homework and are more proactive than their other competitors.

So not only can you learn from these firms on how to use the web more effectively but also take a cue on how they choose to protect their business an their client’s data.

Any size firm can get the same world class tools that our leaders use at a price anyone can afford – less than a buck a user per day.

Why would you want to use Zix? Click here to learn more now.

2 Comments

Filed under Brokers, Compliance, HIPAA, HITECH