Blog

The Business Case for Proactive IT Security and Compliance

As an executive in healthcare, eCommerce, or any industry relying heavily on data and technology (that includes just about everything) you are faced with difficult decisions every day. You know you cannot do everything you would like to do or even everything you should do – at least not today. You face a constant battle … Continued

HIPAA Business Associate Breakdown

Business Associate, Yes or No? The HIPAA Privacy Rule requires Covered Entities to take certain steps to ensure that contractors and vendors requiring access to Protected Health Information (PHI) manage and use that information safely and responsibly. Such a vendor or contractor, of course, is called a “business associate” (BA). While most of us think we … Continued

Run Scans to Keep Software and Tools Current

Even the top of the line security system will not protect your network or critical data if it becomes outdated. Many people do not realize the changes that can take place and the updates that can be missed in the time between a new computer being boxed and shipped to the store and then being … Continued

Incident Response Plan — Why you should prepare now!

n our current economic environment, it goes without saying that ALL organizations should have an active Incident Response (IR) Plan in place.  Companies should have a policy that defines in specific terms what constitutes an information security incident, and provides a step-by-step process to follow when and if an incident should occur.  If your company has a … Continued

Are You Rolling The Dice With Your Risk Assessment?

Why you need a Risk Assessment…. NOW! Risk (noun): exposure to the chance of injury or loss; a hazard or dangerous chance.  Risk mitigation is defined as a systematic reduction in the extent of exposure to a risk and/or the likelihood of its occurrence.  In any business, there are risks.  There are risks in investment, … Continued

Identity Theft Prevention Security Tips

Identity theft has become big business for hackers, small time crooks, and even some nation-states. Millions of Americans have their personal, financial, and medical information compromised every year. To help protect your important information from identity theft, it is important to protect your Social Security number, take precautions on the internet, beware of phishing schemes, … Continued

Has personalization touched healthcare technology yet?

Open Source Personalization, Not Without Risks Everybody understands the term ‘personalized healthcare’, it’s what we have naturally come to expect in the new age of consumerization, Customer Relationship Management and choice. Equally, everybody (these days) understands personalization in the context of the way we use our computing devices from desktops to smartphones. Users at all … Continued

If Your Laptop Were Lost or Stolen

If your laptop went missing tomorrow, misplaced or stolen, what would you do? What could it cost you if your personal and professional data were compromised, possibly in the hands of hackers or identity thieves? Misplaced, unencrypted portable devices are one of the most common sources for data breaches and security incidents that cost US companies and individuals billions … Continued

Just About Everybody You Can Think of Is Excited About The CLOUD

Clinically Speaking, What Shouldn’t You Do In The Cloud? Software companies, device manufacturers, Internet services specialists and just about everybody you can think of is excited about the cloud. For the record, there is of course no ‘actual cloud’ – but it’s a nice expression to explain how web-connected data-centers now serve us with a … Continued

Widespread Connectivity = Widespread Risk… Potentially!

The new drug abuse: ‘changing the bumpers’ on computerized drug-infusion pumps As human beings, our connection points to the so-called Internet of Things are still forming and developing and, in some cases, giving rise to security concerns.  We use this Internet of Things (IoT) term to classify everything from: So-called ‘wearable’ Fitbit-style health tracker devices … Continued

Is your organization HIPAA compliant?

Contact us to find out sooner rather than later.

Ask about our letters of attestation that demonstrate your compliance!