Password Manager Recommendations for Simpler, Better Security
A Password Manager Can Help Pave the Way to HIPAA Compliance We’re all storing more information online than ever before. The average Internet user has at least 90 online ...
Why You Should Be Using Two-Factor Authentication
While strong, complex passwords are an effective first line of defense when securing business accounts and applications, they are not fool proof and can be compromised if a ...
PHI Retention Requirements: A Complete Guide for HIPAA Compliance
Introduction: Understanding PHI Retention In healthcare and associated industries, retaining Protected Health Information (PHI) is critical to regulatory compliance. Knowing ...
What You Need to Know About HIPAA Retraining
It might feel like it was yesterday that your business went through its last HIPAA compliance training. Then, all of a sudden, you realize that a whole year has passed! You ...
Cybersecurity Attacks Are Increasing. How Can You Keep Your Data Safe?
Phishing, ransomware, and supply chain attacks have surged in 2021. Following several significant data breaches in the last year, the Biden administration has urged ...
Selecting a HIPAA Security Officer
For many companies handling Protected Health Information (PHI), ransomware attacks and other cybersecurity threats are a very real danger. Having a strong security program is ...
Can Employers Ask for Proof of Vaccination?
As states reopen and companies invite employees back into the workplace, an employee’s vaccination status will become an important factor in minimizing workplace health risks ...
HIPAA Privacy Officer — How to Select One?
The HIPAA rule mandates that each Covered Entity and Business Associate of a Covered Entity designate a HIPAA Privacy Officer, and the job’s a big one. With the many ...
How to Prepare for a HIPAA Audit
Learn how to effectively prepare for a HIPAA audit and safeguard your organization's sensitive information. Our article provides five essential tips, including employee ...
Repercussions of a Security Breach
Security breaches are something that few businesses address before they happen. And yet, most breaches could have been prevented with the proper technical safeguards in ...
No results found.
Featured Resources
Is Gmail HIPAA Compliant?
Gmail is not automatically HIPAA compliant, however, you can implement security measures…
Read More →
Free Download: HIPAA 101
How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key…
Download Now →
How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become…
Read More →
Free Webinar: Annual HIPAA Requirements & Security Standards
In this webinar, we discussed annual HIPAA requirements, document review, and the compliance…
Watch Now →