Questions? Contact Us

 

Will the Password Ever Go Away?

We have a love/hate relationship with our passwords. We have to love them because they give us access to practically everything necessary in our home and work life – from banking and email accounts to Netflix and school activity accounts. The hate part comes in when we try to recall what password we created for each account – and there are many fro...
Continue reading
926 Hits
0 Comments

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
810 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1128 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1298 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
898 Hits
0 Comments