


Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra protection to your files by minimizing the risk of a breach in the event your device is lost or stolen. This is because an encrypted and password protected...
HIPAA Compliant Email Encryption Review
Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they store and come in contact with at rest, storage and transit. Today we are going to be discussing your options for protecting ePHI in transit;...
OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates in October motivated a Covered Entity’s compliance officer to call Total HIPAA last week. He had done a Google search on what a Covered Entity should do...
Strong Passwords – Your Employees Most Important Contribution to Network Security
Are your passwords so easy that a seven year old can figure them out? In 2012, Dropbox verified that the user information of 68 million Dropbox users was stolen. This information included both usernames and passwords. Though Dropbox was aware of this breach, there was...