Resources

Client Alerts, News Articles, Blog Posts, & Multimedia

Everything you need to know about BMD and the industry.

FTC Increases Targeting of Companies Lacking Cyber Protection

Client Alert

Here is how businesses can develop cyber strategies to mitigate breaches and financial risk.

The Federal Trade Commission (FTC) recently released a comprehensive cybersecurity report outlining key findings and recommendations based on emerging threats, trends in data breaches, and strategies for businesses to enhance their cybersecurity posture observed over the last year. The FTC strives to protect consumer privacy and respond to the evolving ways that companies use consumer data such as in the development of artificial intelligence models and misuse of health data. 

Importantly, the report emphasized the need for proactive measures to mitigate risks and highlighted the FTC’s initiative in targeting companies that fail to implement reasonable data security measures to protect consumer data. 

Here are some key strategies for businesses: 

  1. Risk Assessment and Management: Conduct regular risk assessments (at least annually) to identify potential vulnerabilities and prioritize them based on their potential impact on the business. Develop and implement a risk management plan to address these vulnerabilities effectively.
  2. Cyber Security Policies and Procedures:  Implement basic cybersecurity policies to protect its assets, data, and operations from cyber threats.
  3. Employee Training and Awareness: Educate employees about cybersecurity best practices, such as recognizing phishing emails, using strong passwords, and reporting suspicious activity. Regular training exercises help reinforce awareness.
  4. Access Control and Privilege Management: Implement strong access controls to limit user privileges and restrict access to sensitive data and systems. Use multi-factor authentication (MFA) where possible to add an extra layer of security.
  5. Data Encryption: Encrypt sensitive data to protect it from unauthorized access. 
  6. Patching: Keep software and systems up to date with the latest security patches to address known vulnerabilities. Establish a patch management process to ensure timely deployment of patches across the organization.
  7. Network Security: Deploy firewalls, intrusion detection/prevention systems, and other network security measures to monitor and protect against unauthorized access and malicious activity. Segment networks to limit the spread of potential breaches.
  8. Incident Response Plan: Develop a comprehensive incident response plan that outlines procedures for detecting, containing, and mitigating cybersecurity incidents. Test the plan regularly through tabletop exercises and simulations.
  9. Vendor Risk Management: Assess the security practices of third-party vendors and service providers to ensure they meet your organization's security standards. Include contractual clauses that outline security requirements and responsibilities.
  10. 10. Cyber Insurance: Consider obtaining cyber insurance to mitigate financial risks associated with cybersecurity incidents, such as data breaches or business interruptions.

By adopting a proactive approach to cybersecurity and implementing these strategies, businesses can enhance their cybersecurity posture and better protect themselves against evolving threats and complying with ever increasing legal obligations.  

BMD assists companies design and implement a strategy to achieve technical and organizational controls to bolster cybersecurity and data protection.  

If you have any questions regarding this topic and how to protect your company's data, please contact BMD Member Brandon Pauley at btpauley@bmdllc.com.


Property Owner Protection from Tax Valuation Challenges

New legislation provides significant new protections for commercial property owners against challenges to valuation primarily by local school boards and prohibiting side agreements to avoid tax valuation changes. The Ohio Legislature has approved House Bill 126 which will go into effect July 2022 but will effectively apply to the 2023 tax valuation year.

No Surprises Act Update: The IDR Portal is Open

The No Surprises Act (“NSA”) became effective January 1, 2022, and has been the subject of lawsuits and criticisms since its inception. The goals of the No Surprises Act are to shield patients from surprise medical bills, provide to uninsured and self-pay patients good faith estimates of charges, and create a process to resolve payment disputes over surprise bills, which arise most typically in emergency care settings. We have written about Part I and Part II of the NSA previously. This update concerns the Independent Dispute Resolution (“IDR”) procedure created by Part II but applicable to claims covered by Part I. The Centers for Medicare & Medicaid Services (“CMS”) finally opened the Portal for providers to submit disputes to the IDR process following some updated guidance regarding the arbitration process itself.

Updated FAQs for the No Surprises Act - Good Faith Estimates

The No Surprises Act (“NSA”) became effective January 1, 2022. Meant to protect consumers from surprise medical bills, the new law is good for consumers, but vexatious for health care providers and facilities. One particular source of frustration is the operationalization of the Good Faith Estimate (“GFE”) requirement, governed by Part II of the regulations that implement the NSA. The GFE requirements apply broadly to all healthcare providers and facilities that practice within the scope of their state-issued license.

IMPORTANT PRF UPDATE! HRSA Allows Providers the Opportunity to Correct Missed Period 1 Reporting

Late Wednesday, April 6, HRSA announced that it was going to allow providers with extenuating circumstances that prevented them from preventing a completed Period 1 Report to submit a Request to Report Late Due to Extenuating Circumstances.

Advanced Practice Providers and Telemedicine Start-Up Surge

Throughout the COVID-19 pandemic, we heard a lot about “surges” that happened all over the country regarding the virus. One of the other interesting “surges” we have followed is the “surge” in new healthcare business start-ups, particularly businesses owned by advanced practice providers, such as nurse practitioners, physician assistants, certified nurse midwives, clinical nurse specialists, and certified registered nurse anesthetists (“Advanced Practice Providers” or “APPs”). One of the hottest areas in the healthcare start-up surge has been the creation of practices that are telemedicine focused.