Questionnaire about security awareness training

Seven Reasons Why Cyber Security Awareness Training Is Essential In 2023

Discover the essential role of Security Awareness Training in 2023. This guide explains why cybersecurity training is more critical than ever for businesses, with insights into human error, reputation protection, compliance, employee awareness, insider threat reduction, financial loss prevention, and staying ahead of emerging threats.

Why Are Healthcare Providers the Biggest Ransomware Targets? (Tips to Safeguard HIPAA Protected Records)

Ransomware Attacks and Why Are Healthcare Providers the Biggest Ransomware Targets? (Tips to Safeguard HIPAA Protected Records)

Ransomware attacks are such a serious threat to organizations that in October of 2019, the FBI put out a Public Service Announcement (PSA) about this dangerous threat and the increasingly significant losses incurred due to ransomware. One thing we have seen is healthcare is one of the biggest ransomware targets today. The PSA was titled, …

Ransomware Attacks and Why Are Healthcare Providers the Biggest Ransomware Targets? (Tips to Safeguard HIPAA Protected Records) Read More »

How to Avoid the 5 Most Common HIPAA Compliance Mistakes

How to Avoid the 5 Most Common HIPAA Compliance Mistakes

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) can be complex due to the fact that there are multiple ways that sensitive patient information can be compromised in the course of a day. It is possible to avoid costly HIPAA compliance mistakes and prevent your organization from wasting time and resources. In 2018, …

How to Avoid the 5 Most Common HIPAA Compliance Mistakes Read More »

A Beginner’s Guide to HIPAA Compliance

A Beginner’s Guide to HIPAA Compliance

When it comes to data privacy regulations like HIPAA compliance rules, they tend to be very detailed and can be difficult for the average person that’s not trained in data security to get through.  In today’s digital age, companies have all types of sensitive data being gathered, stored, and transmitted in electronic form, and these …

A Beginner’s Guide to HIPAA Compliance Read More »

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow. The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected Health Information (ePHI). ePHI refers to …

A provider’s survival guide to HIPAA threat evaluation Read More »

For HIPAA controls, how O can you go?

There’s devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various processes, procedures and system …

For HIPAA controls, how O can you go? Read More »

With enforcement on the rise, HIPAA audits take on new meaning

Given the new presidential administration and the unclear fate of the Affordable Care Act, some health care providers (covered entities) may be wondering if Health Insurance Portability and Accountability Act (HIPAA)privacy and security regulations might be falling by the wayside. Recent news suggests that HIPAA audits, which were originally designed to be educational rather than punitive, are …

With enforcement on the rise, HIPAA audits take on new meaning Read More »

Vyatta border gateway passthrough filtering

It is generally a best practice to include multiple layers of security for any infrastructure.  Even if you are just routing packets, your routers are your outside perimeter and should include tools to restrict traffic not only to the device itself but also to the traffic that passes through. This doesn’t mean the router should …

Vyatta border gateway passthrough filtering Read More »

Health Insurance Portability & Accountability Act and Web Hosting

“HIPAA” is an acronym for the Health Insurance Portability & Accountability Act of 1996 (August 21), Public Law 104-191, which amended the Internal Revenue Service Code of 1986. Also known as the Kennedy-Kassebaum Act, the Act includes a section, Title II, entitled Administrative Simplification, requiring: More specifically, HIPAA called upon the Department of Health and …

Health Insurance Portability & Accountability Act and Web Hosting Read More »

Scroll to Top