Questions? Contact Us

 

Latest News

Featured News & Events

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
102 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
103 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
139 Hits
0 Comments

Springtime for hackers

​With blooming flowers, chirping birds and warming temperatures, spring finally arrived in April. But it seems the wonders of nature aren't the only thing that spring brought us. We're also getting fresh reports of hackers who are up to no good.And I'm not talking about Netflix having their shows stolen, held for ransom and released online. While t...
Continue reading
159 Hits
0 Comments

Security in the Cloud: It’s Easier Than You Think

The shift in recent years to cloud computing has put seemingly unlimited computing and data storage capacity at the fingertips of the masses – from the smallest businesses to the largest corporations. Increasingly, there's often little thought put into uploading that next batch of files to the cloud or spinning up that new virtual server, as the bi...
Continue reading
194 Hits
0 Comments

Our Newsletter

Tag Cloud

Healthcare Records CentOs business solutions InterWorx Sysadmin ZZ Servers management cyber ICANN QSA business exchange Information Technology credit card Control Panel Domani Names Firetalk assesment PCI Audit malicious software SSL education Online Business credit card payment cloud iphone compliance PCI Compliance shared secure hosting IT security search Medical Solutions Geekend OSSEC spf anti virus Reports vulnerability scanning Car Hacking Internet Hackers apache amazon ec2 information technology lamp social engineering support Interworx-CP blackberry Credit Cards dsbl data breach cli bash PCI Solutions Home Depot Breach Compliance command line mail server HIPAA log files Web Hosting HIDS DEF CON eCommerce Solutions Security small business cyber liability insurance physical security Assigned Names HIPAA Solutions TLS Vulnerability Ubuntu Presentation compliant hosting pci complliant hosting Cloud Computing permissions backup solutions protect data qsa Internet Corporation eCommerce dss Shmoocon INFOSEC business solitions Continuous Monitoring vps computer networks physical Hosting kerio phishing change caller-id embedded security openssl video IT services BSides activesync Email TiaraCon Las Vegas Credit Card Security computing in the cloud shared folders IT Solutions recovering data Debian Charleston Zendzian infrastructure PCI Medical Records Business Solutions cybersecurity teensy sender policy Announcement David Zendzian healthcare solutions Xen arduino Cybersecurity IT solutions smartphone VPS Servers business community password Linux businesses spoofing members area Windows PCI Service Provider network vyatta router firewall filter security PCI HIPAA shared hosting Alarm ZZ Servers Co-Founder Server Mangement Cybersecurity Business Solutions HIPAA solutions HIPPA Health Care Cybersecurity PCI DSS 3.2 cyber security ipad credit cards stolen windows 7 trends hosting control panel IT cell phone email Internet infrastructure motivation shared server spam World Backup Day Small Business