ABYDE FOR ODA MEMBERS

It's time for stress-free compliance.

  • EASIEST SOFTWARE YOU’LL EVER USE

    And if we’re being honest, easy is an understatement. All companies say it, but we are so confident in the simplicity of our software that we will prove it.

  • ‘HANDS OFF’ APPROACH

    We automate it all – from notifications about training to policy generation. Can you imagine not having to set your own reminders?! Go ahead, focus on your patients – we will ping you with the important stuff.

  • CUSTOMER SUCCESS TEAM LIKE NO OTHER

    We will meet you where you are – whether that’s by phone, chat, or email. It’s tough stuff in the tech space, but our customers love us as much as we love them.

  • STATE BY STATE, LAW BY LAW

    No matter what state your practice is in, our solution is for you — from sea to shining sea. We know our stuff and dedicate ourselves to staying on top of the latest state and federal changes so you don’t have to.

  • MORE THAN JUST SOFTWARE

    With us, you get more than policies and software. We offer Master Classes, newsletters, and more to keep you up to date. At the end of the day, we are proud to lead with education.

LATEST COMPLIANCE NEWS

HIPAA Access Logs

Who’s Looking at Patient Records? Access Logs Tell All

September 15, 2025 In your practice, everyone plays an important role.  From receptionists handling schedules to doctors delivering care, ensure every team member knows their role and is empowered to act on it. Role-based privileges, which dictate who has access to what information, are also part of assigning roles in your practice. For example, while your receptionist might have access to a patient’s contact information to confirm an appointment, a doctor would have access to X-rays to assist in treatment plans.  Without clear boundaries, your practice risks HIPAA violations. For example, it’s a major compliance breach if Beth from accounting looks at a patient’s sensitive health records.  That’s where access logs come into play.  HIPAA Access logs are key to ensuring that Protected Health Information (PHI) is kept secure.    What is an HIPAA Access Log? As the name suggests, HIPAA access logs account for who, when, and for how long a staff member is utilizing a specific software. Your EHR or EMR will keep a running log when staff access information. Your practice must maintain access logs for six years.  That’s why it’s so essential for every staff member to have an individual login when using your practice’s systems.  Your practice’s HIPAA Compliance Officer (HCO) must routinely monitor access to PHI. Staff must know their responsibilities and the consequences of exploiting access to health records.  The OCR takes these exposures very seriously. Earlier this year, a health organization was fined $800,000 due to unauthorized access to health records. The number of exposed patients? One. The patient became aware of this breach and reported the organization to the OCR.  An access log is imperative for monitoring unauthorized third-party access, such as hackers, in addition to ensuring staff follow their role-based responsibilities.  Healthcare records can often be compromised, and no one realizes it until it’s too late.  Cyberattacks happen to organizations of all sizes.  In fact, after the multi-billion-dollar breach, investigators found that hackers had infiltrated Change Healthcare’s systems and gone undetected for over a week.   Stay Logged In  Clear roles and HIPAA access logs aren’t just paperwork; they’re vital for the success of your practice.  Your practice must train and empower staff on their responsibilities and investigate when things seem fishy. It only takes one slip-up, even just one patient’s records, to be exposed by impermissible access and caught in the OCR’s crosshairs.  With the right software solution, your practice can streamline training, documentation, and logs within a centralized compliance hub. Smart software gives your team the tools to succeed and makes compliance completely doable. Meet with an expert today to learn more about simplifying HIPAA compliance for your practice. 

Read More »
Email Safety in Healthcare

One Click Away from a Breach: Protecting your Practice from Phishing Emails

August 28, 2025   We’ve all received an email that’s a little too good to be true.  Maybe it’s a “Congratulations, you’ve won a free vacation!” message, or a heartfelt request from an “international prince” who just needs your bank details. While these examples may sound obvious, phishing emails today are far more convincing, using logos, sender names, and even tone that mirror trusted organizations. However, healthcare staff have an even bigger target on their backs due to the sensitive nature of Protected Health Information (PHI). Healthcare staff, from the office manager to the doctor, are close to patients’ Social Security Numbers, billing information, and more, all of which are a goldmine for a malicious actor.  In light of the most recent $170,000 phishing HIPAA fine, it’s essential to review the best tips for keeping your email and patient data secure.    Email Safety 101 When hackers send 3.4 billion phishing emails daily, it’s essential to remain vigilant when reviewing emails. One mistaken click can jeopardize thousands of health records, so always carefully read your emails.  While your spam filter might hide some risky emails, phishing has become more advanced, including spoofing staff members and, in general, looking legitimate upon first glance.  First, when receiving an email, always think before you click. Does the email look suspicious? Is the grammar odd? Are there unnecessary attachments? Never download any attachments unless you are sure of the sender. A hacker could expose your entire practice to ransomware with one unsafe attachment. All it takes is one click.  When receiving an email, always ensure the account looks authentic. A familiar name doesn’t always mean a safe email. Cybercriminals are betting on healthcare staff not knowing the difference between ‘yourboss@email.com’ and ‘y0urboss@email.com’. The internet also provides hackers access to public posts, so even if the profile photo might be of your boss, chances are it isn’t your boss sending you an email demanding personal information.  Watch for common red flags.  If an email feels unusual, pause before acting, especially with messages marked as “urgent.” Cybercriminals rely on panic to push quick clicks. For example, an email shouting “WARNING: Update your EHR immediately using this link” is likely a scam designed to trick you into handing over access.  Delete spam emails or forward them to your phishing IT team (if applicable, likely for larger organizations), and ensure your team is aware of any threats and trained to identify and handle them appropriately.    Keeping it Secure Phishing emails aren’t rare; they’re routine.  That’s why it’s critical to give your staff the tools they need to safeguard PHI. A strong compliance program goes beyond policies by providing hands-on email safety training, encouraging protections like multi-factor authentication, and connecting your practice with trusted IT resources. Meet with an expert today to learn more about HIPAA compliance and email safety.  

Read More »

READY TO BE STRESS-FREE?