fbpx
Why Are Healthcare Providers the Biggest Ransomware Targets? (Tips to Safeguard HIPAA Protected Records)

Ransomware Attacks and Why Are Healthcare Providers the Biggest Ransomware Targets? (Tips to Safeguard HIPAA Protected Records)

Ransomware attacks are such a serious threat to organizations that in October of 2019, the FBI put out a Public Service Announcement (PSA) about this dangerous threat and the increasingly significant losses incurred due to ransomware. One thing we have seen is healthcare is one of the biggest ransomware targets today. The PSA was titled, …

Ransomware Attacks and Why Are Healthcare Providers the Biggest Ransomware Targets? (Tips to Safeguard HIPAA Protected Records) Read More »

How to Avoid the 5 Most Common HIPAA Compliance Mistakes

How to Avoid the 5 Most Common HIPAA Compliance Mistakes

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) can be complex due to the fact that there are multiple ways that sensitive patient information can be compromised in the course of a day. It is possible to avoid costly HIPAA compliance mistakes and prevent your organization from wasting time and resources. In 2018, …

How to Avoid the 5 Most Common HIPAA Compliance Mistakes Read More »

A Beginner’s Guide to HIPAA Compliance

A Beginner’s Guide to HIPAA Compliance

When it comes to data privacy regulations like HIPAA compliance rules, they tend to be very detailed and can be difficult for the average person that’s not trained in data security to get through.  In today’s digital age, companies have all types of sensitive data being gathered, stored, and transmitted in electronic form, and these …

A Beginner’s Guide to HIPAA Compliance Read More »

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow. The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected Health Information (ePHI). ePHI refers to …

A provider’s survival guide to HIPAA threat evaluation Read More »

For HIPAA controls, how O can you go?

There’s devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various processes, procedures and system …

For HIPAA controls, how O can you go? Read More »

With enforcement on the rise, HIPAA audits take on new meaning

Given the new presidential administration and the unclear fate of the Affordable Care Act, some health care providers (covered entities) may be wondering if Health Insurance Portability and Accountability Act (HIPAA)privacy and security regulations might be falling by the wayside. Recent news suggests that HIPAA audits, which were originally designed to be educational rather than punitive, are …

With enforcement on the rise, HIPAA audits take on new meaning Read More »

Vyatta border gateway passthrough filtering

It is generally a best practice to include multiple layers of security for any infrastructure.  Even if you are just routing packets, your routers are your outside perimeter and should include tools to restrict traffic not only to the device itself but also to the traffic that passes through. This doesn’t mean the router should …

Vyatta border gateway passthrough filtering Read More »

Health Insurance Portability & Accountability Act (HIPPA), PCI, SOX and Web Hosting

“HIPAA” is an acronym for the Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, which amended the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act, the Act includes a section, Title II, entitled Administrative Simplification, requiring:   Improved efficiency in health care delivery by standardizing electronic …

Health Insurance Portability & Accountability Act (HIPPA), PCI, SOX and Web Hosting Read More »

SUBSCRIBE TO OUR

NEWSLETTER

JOIN THE ELITE CLUB

15585

8 Reasons It’s Time To Change Your IT Provider

your guide to understanding why it may be time to change IT providers.

 

Exclusive details include:

 

 - Recurring Issues
 - Slow Response Times
 - Constant Up-selling
 - Forcing pre-payments
 - Lack of Transparency
 - Blaming and Finger Pointing
 - Lack of Flexibility
 - Lock In

Thank you for your interest.  We'd love the opportunity to help you find the best payment processing plan for your business. We look forward to talking with you.

Currently Processing Credit Cards?

Please complete this form to have a specialist contact you.

We’d love to chat.

Looking to

Start a Project?

CONTACT US
Scroll to Top