THE TOTAL HIPPA
Resource Library
Featured Podcasts
Remote Work During COVID-19
Total HIPAA's CCO, Jason Karn, speaks to LuxSci founder and CEO Erik Kangas about securely working remotely during the COVID-19 pandemic. They discuss helpful tips for keeping devices and networks...
Cybersecurity for Small and Medium-Sized Businesses
Andrew Kroninger, Total HIPAA’s Director of Customer Success, recently interviewed Erik Kangas, founder and CEO of LuxSci. LuxSci provides email encryption, web hosting, forms, and secure sending...
Managed Service Providers Help with HIPAA Compliance
Jason Karn, Total HIPAA Chief Compliance Officer, spoke with Greg Manson, Director of Security, Audit, and Compliance at Carolinas IT, about the process of hiring a Managed Service Provider (MSP)....
Search all Podcasts
Use a VPN for HIPAA Compliance
Jason Karn, Chief Compliance Officer at Total HIPAA, recently discussed the importance of a Virtual Private ...
A Managed Service Provider Can Assist Your Company to Meet HIPAA Compliance Requirements
Jason Karn, Chief Compliance Officer for Total HIPAA, talks with Greg Manson, Director of Audit and Compliance, at ...
Are Macs Really More Secure Than Windows Computers?
There’s a common misconception that Mac users are safe and secure from hackers and viruses. Is this really true in ...
What Can You Do Right Now to Improve Your Security Stance?
There are a variety of things you can do to lock down your data without complex penetration testing. Drew Green, ...
Remediating Issues Found in a Penetration Test
What do you do after learning about weaknesses in your defenses? Drew Green, Director of Information Technology at ...
How to Choose a Company for a Penetration Test
A penetration test is a crucial tool used to protect your information. Being able to trust your security expert is ...
Customizing Penetration Testing for your Situation
Customizing a penetration test is the best way to determine your real-world security posture. Does having a cloud ...
What to Expect From a Penetration Test
As a business owner, it is valuable to be familiar with what is involved in the process of a penetration test, so ...
Simulating a Hacker: What is Penetration Testing?
It is crucial that you preemptively defend against potential breaches. But what are the weaknesses within your ...
Take control of your compliance.
