


What to Do If a Client or Auditor Asks for a Pen Test
If your organization handles sensitive information, you may encounter a client, security auditor, or third party asking for a copy of your most recent penetration test. This test, otherwise known as a pen test, is a cybersecurity technique organizations use to...
Is Gmail’s Confidential Mode HIPAA Compliant?
Gmail is exceedingly popular among email users for both personal and business purposes — and for good reason. It’s the second most widely-used email platform, after Apple Mail. It’s well run, user friendly, and quick to address any issues that arise. So it’s no...
Basic HIPAA Guidelines: Annual Update 2022
We recently hosted a webinar, “Annual HIPAA Requirements and Security Standards,” in which we discussed annual HIPAA requirements, document review, and the compliance procedures you need to have in place to prevent breaches and pass audits. In the webinar, we...
How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become increasingly more sophisticated, so have attackers’ methods. According to the U.S. Department of Health and Human Services (HHS), incidents of hacking affecting 500 people or more...