Month: August 2016

Always Use Two Factor Authentication but Remain Vigilant

By now, most of the major online tools we use and the most popular sites we log into offer if not require two-factor authentication (2FA). There are several ways a two factor system can be implemented but, essentially, it will always involve using something you know, like a password, plus something you have, like a mobile device … Continued

Incident Response 101: Where Notification Requirements May Differ from HIPAA

In our recent series of articles answering the key questions about what notifications steps HIPAA regulated organizations must take after a security breach, we have looked at: Who is Required to Report a Breach? When Do You Need to Report a Breach?  What Must Be Reported Following a Breach? To wrap up this topic, we … Continued

Is your organization HIPAA compliant?

Contact us to find out sooner rather than later.

Ask about our letters of attestation that demonstrate your compliance!