TOTAL HIPAA
Free Resources
 HIPAA Blogs, Podcasts, and Webinars at Your Fingertips

Data Security in the United States
Like it or not, our national and state governments know a lot about us. Each U.S. state holds a huge amount of data about its citizens, including personally identifiable ...

Physically Securing Your Work Environment
HIPAA compliance may seem daunting, but, believe it or not, there are easy, cost-effective steps you can take right now to help get you there. If you’re responsible for ...

HHS OCR Aims for Breach Victims to get Share of HIPAA Settlements
An Important Television Commercial Announcement:
Has your health information been inappropriately released by your healthcare professional or your employer? You may be ...

GDPR and HIPAA Compliance – Do They Overlap?
GDPR, or General Data Protection Regulation, has sent companies big and small scrambling since it went into effect May 25, 2018.1 While the majority of companies affected are ...

Benefits of VPN for HIPAA Compliance
For many businesses, a Virtual Private Network (VPN) is one of the best and easiest ways to implement network security, protect data transmission, provide encryption and meet ...

Public Wifi Use and HIPAA
I love going to the local coffee shop for a change of scenery, especially now that the weather is so nice here in North Carolina! I’m sure this is pretty common for most ...

Cybercrime and Your Small Business
Almost 90% of small business owners don’t feel like they’re at risk of experiencing a breach. Based on a poll by Manta1 in March 2017, that’s a big problem, especially since ...

What Does HIPAA Enforcement Look Like in 2018?
If there aren’t repercussions for breaking laws or rules, there’s no point in having them at all. For example, if you drive over the speed limit, the police give you a ticket ...

The Importance of a Risk Assessment
Why is a HIPAA Risk Assessment So Important?
HIPAA requires you to complete a Risk Assessment, often referred to as a Risk Analysis, regularly and for specific situations. ...

Protect Yourself from Phishing Scams
Data breaches generated through emails are the primary channel for hackers to access your company’s data. Phishing attacks are so frequent and successful that the Health and ...
Featured Resources

Is Gmail HIPAA Compliant?
Gmail is not automatically HIPAA compliant, however, you can implement security measures…
Read More →

Free Download: HIPAA 101
How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key…
Download Now →

How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become…
Read More →

Free Webinar: Annual HIPAA Requirements & Security Standards
In this webinar, we discussed annual HIPAA requirements, document review, and the compliance…
Watch Now →
Join Thousands of
Satisfied Organizations
Streamline your compliance with Total HIPAA and reclaim valuable time for your core business.
