Questions? Contact Us

 

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1413 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1792 Hits
0 Comments

ZZ Servers Co-Founder Spoke at International Business Conference

‚ÄčIn an increasingly global world connected through digital platforms and social media, cybersecurity is more important than ever. Protecting proprietary and customer information is essential. But cybersecurity goes beyond firewalls and log monitoring. It also means employee education about how to protect the company from bad actors in the cyber wor...
Continue reading
1370 Hits
0 Comments

Hosting in a secure environment is necessary for all businesses

Hosting in a secure environment is necessary for all businesses
‚ÄčIn today's online-driven world, it's not a matter of if, but when a business will a victim of a cyber-attack.The threat of a data breach has become so imminent that an entirely branch of insurance products (cyber liability and privacy policies) have exist specifically to cover a business' liability in the event a hacker steals or exposes sensitive...
Continue reading
1954 Hits
0 Comments