Demystifying HIPAA Sanctions: A Guide for Employers and Healthcare Workers
HIPAA Violations and Consequences: A Guide for Employers and Healthcare Workers Understanding HIPAA Sanction Policies: Protecting Your Business and Patient Privacy The ...
How to Ensure the Safety of Your Backups
We have witnessed an explosion of technological innovation since HIPAA was enacted in 1996. Most businesses swapped their filing cabinets for cloud computing systems years ...
Data Breach: 10 Ways to Prevent This Potential Nightmare
This month, we devoted multiple blog posts to covering major HIPAA violations and their penalties. Today’s post will explain the most common causes of breaches and the ...
HIPAA and Cloud Computing
On October 7, 2016, HHS released a guidance on HIPAA and cloud computing.¹ As the use of cloud computing continues to grow, it is important for HIPAA covered entities and ...
How to Dispose of Electronic Devices if You Are Dealing With Electronic Protected Health Information
People get rid of electronic devices all the time. There’s always a newer, stronger, more sophisticated version of your laptop, smartphone, or tablet. If you’re dealing with ...
Block Hackers with HIPAA Training
HIPAA Rules require that your organization provide training to employees on privacy and security awareness. Employees should know about the law as well as your organization’s ...
WARNING: Your Fax Machine Could be Used to Hack You!
American businesses have used fax machines to transmit images via telephone lines since the late 1980s. Now, almost forty years later, many organizations are still relying on ...
How a VPN Can Help with HIPAA Compliance
Jason Karn, Chief Compliance Officer at Total HIPAA, recently discussed the importance of a VPN for groups that need to be HIPAA compliant with Karen Mesoznik, Head of ...
HIPAA Demands Smart Decisions for Smart Phones
If you had to guess how many Americans use a smartphone, what would your answer be? If it seems to you like they’re everywhere, you’re right! Here’s proof that we’ve ...
Cyber Thieves Thrive During Natural Disasters-Test
What better time to exploit the kindness of well-meaning people who want to help victims than during natural disasters? Cybercriminals are waiting in the wings to take your ...
No results found.
Featured Resources
Is Gmail HIPAA Compliant?
Gmail is not automatically HIPAA compliant, however, you can implement security measures…
Read More →
Free Download: HIPAA 101
How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key…
Download Now →
How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become…
Read More →
Free Webinar: Annual HIPAA Requirements & Security Standards
In this webinar, we discussed annual HIPAA requirements, document review, and the compliance…
Watch Now →