Questions? Contact Us

 

Latest News

Featured News & Events

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
34 Hits
0 Comments

Cybersecurity Awareness Event to Offer Practical Tips on Identity Theft Protection for Individuals and Small Businesses

Local business owners and the general public are invited to a free Cybersecurity Awareness Event on August 17 at 6:30 PM in the Pembroke Office Park Building in Virginia Beach.Industry experts will explain – in layman's terms – why cybersecurity is more important than ever and what practical steps individuals can take to protect themselves from onl...
Continue reading
114 Hits
0 Comments

WannaCry Ransomware Teaches Painful Lesson in Patch Management

​Irony. A state of affairs or an event that seems deliberately contrary to what one expects and is often amusing as a result.When you think about it, isn't it ironic that we spend a great deal of money on expensive bags, covers and screen protectors to protect the OUTSIDE of our computer devices when the real threat comes from the INSIDE? There's n...
Continue reading
132 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
222 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
223 Hits
0 Comments

Our Newsletter

Tag Cloud

IT Solutions activesync Assigned Names physical security InterWorx IT services command line PCI Audit Interworx-CP cybersecurity members area David Zendzian Geekend eCommerce Information Technology Health Insurance Portability trends PCI INFOSEC Cybersecurity Business Solutions shared hosting caller-id lamp VPS Servers protect data video computer networks Shmoocon shared secure hosting OSSEC log files Online Business spam Web Hosting exchange Security cyber security smartphone dsbl Presentation DEF CON Debian security compliance Hosting IT HIPAA Solutions business solitions ipad mail server Healthcare Records HIPAA PCI Service Provider Accountability Act business Firetalk kerio cell phone email QSA embedded Reports Credit Cards blackberry windows 7 assesment Cloud Computing BSides follow.The HIPAA Privacy Rule education iphone Small Business TLS Cybersecurity Internet infrastructure Car Hacking data breach recovering data business solutions SSL apache Continuous Monitoring credit card payment spf IT security hosting control panel Credit Card Security management Charleston amazon ec2 permissions Sysadmin Medical Records Home Depot Breach ZZ Servers shared server Compliance Zendzian Health Care Cybersecurity openssl TiaraCon World Backup Day arduino ICANN Internet Corporation qsa Email vyatta router firewall filter security PCI HIPAA eCommerce Solutions Control Panel PCI Solutions shared folders Hackers cyber small business anti virus credit cards stolen Internet PCI Compliance search motivation Vulnerability HIPAA solutions Announcement backup solutions phishing bash Windows Alarm Ubuntu sender policy healthcare solutions cloud Las Vegas Server Mangement pci complliant hosting cli change ZZ Servers Co-Founder Domani Names Xen spoofing Linux computing in the cloud HIDS Business Solutions business community vps malicious software support compliant hosting social engineering PCI DSS 3.2 network physical health care providers IT solutions businesses information technology vulnerability scanning infrastructure teensy password HIPPA credit card cyber liability insurance CentOs Medical Solutions dss