
Working Remotely While Staying HIPAA Compliant: Using a Virtual Private Network (VPN) vs. SSL/TLS in a HIPAA Environment
Whether you’re working from home, your local coffee shop, or from the airport between layovers, you will likely need to connect to your organization’s network. A public or ...

How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become increasingly more sophisticated, so have attackers’ methods. According to the U.S. ...

Microsoft Announces End of Support for Internet Explorer
Internet Explorer was once one of the biggest players in the browser game, but now it’s coming to its end of days. Starting June 15, 2022, Microsoft will end support of ...

HIPAA Risk Assessment for Insurance Agents: What to Expect
As an insurance agent, you may be wondering how the Health Insurance Portability and Accountability Act (HIPAA) impacts your business. The law aims to protect patient ...

Protected Health Information (PHI): Everything You Need to Know about HIPAA and PHI
Curious about PHI? Dive into our featured blog post to uncover the answer to the question: "What does PHI stand for?" Gain valuable insights into the significance of ...

HIPAA Audits for Insurance Agents
Insurance agents who handle protected health information (PHI) are required to comply with the Health Insurance Portability and Accountability Act (HIPAA). One way to ensure ...

HIPAA Training for Insurance Agents: Requirements and Strategies
Insurance agents who handle protected health information (PHI) are required to comply with the Health Insurance Portability and Accountability Act (HIPAA). One important ...

What is NIST 800-50 and How Should It Inform Your HIPAA Training?
For organizations that deal with sensitive client or employee information, (e.g., Medical Practices, Employer Groups, Business Associates, and Business Associate ...

How HIPAA Safeguards Can Help You Safely Transmit PHI
For organizations handling Protected Health Information (PHI), cybersecurity attacks and other security threats are always just around the corner. Having a strong security ...

New OCR Guidelines for Defending Against Cybersecurity Attacks
In a recent statement, President Biden encouraged private sector companies to give increased attention to their cybersecurity programs against potential attacks. This came ...
No results found.
Featured Resources

Is Gmail HIPAA Compliant?
Gmail is not automatically HIPAA compliant, however, you can implement security measures…
Read More →

Free Download: HIPAA 101
How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key…
Download Now →

How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become…
Read More →

Free Webinar: Annual HIPAA Requirements & Security Standards
In this webinar, we discussed annual HIPAA requirements, document review, and the compliance…
Watch Now →
Join Thousands of
Satisfied Organizations
Streamline your compliance with Total HIPAA and reclaim valuable time for your core business.
