THE TOTAL HIPAA
Resource Library
Featured Articles
3 Reasons Insurance Agents Need to Follow HIPAA
Health insurance agents became covered under HIPAA with the HITECH Act of 2009. The inclusion of insurance agents was a response to the increasing use of electronic health records and the need to...
Only a Few Days Remain to Report Small Breaches
Did you know that any HIPAA security breaches affecting less than 500 individuals in 2022 must be reported to the US Department of Health and Human Services by March 1, 2023? That is just a few days...
Microsoft End of Support for 2023
Each year, we publish Microsoft’s End of Support list because using up-to-date software is essential for HIPAA compliance. Microsoft will terminate support for earlier versions of a long list of its...

3 Reasons Insurance Agents Need to Follow HIPAA
Health insurance agents became covered under HIPAA with the HITECH Act of 2009.
The inclusion of insurance ...

Using a Virtual Private Network (VPN) vs. SSL/TLS in a HIPAA Environment
Whether you’re working from home, your local coffee shop, or from the airport between layovers, you will likely ...

How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become increasingly more ...

Microsoft Announces End of Support for Internet Explorer
Internet Explorer was once one of the biggest players in the browser game, but now it’s coming to its end of days. ...

Protected Health Information (PHI): Everything You Need to Know about HIPAA and PHI
What is Protected Health Information (PHI)?
The Health Insurance Portability and Accountability Act (HIPAA) is a ...

Can You Share PHI Over Phone or Text?
We live in a fast-paced, digital world where information is shared more quickly than it ever has been. Between ...

What is NIST 800-50 and How Should It Inform Your HIPAA Training?
For organizations that deal with sensitive client or employee information, (e.g., Medical Practices, Employer ...

How HIPAA Safeguards Can Help You Safely Transmit PHI
For organizations handling Protected Health Information (PHI), cybersecurity attacks and other security threats ...

New OCR Guidelines for Defending Against Cybersecurity Attacks
In a recent statement, President Biden encouraged private sector companies to give increased attention to their ...

Password Best Practices Are Changing. How Should You Adapt?
As technology becomes more and more sophisticated, so do the strategies hackers use in data breaches. Now more ...

HIPAA and ERISA: Everything You Need to Know
If you’ve been taking concrete steps towards implementing and maintaining HIPAA compliance across your ...

Deadline for Reporting Small HIPAA Breaches Is March 1st
HIPAA breaches involving fewer than 500 individuals which occurred during 2021 must be reported to the ...

Top 10 Total HIPAA Blogs of 2021
Throughout 2021, Total HIPAA has focused on providing information that will keep your organization HIPAA compliant ...

The Ohio Data Protection Act and HIPAA Compliance
Every day, there seems to be a new headline about another organization whose data security has been breached. It’s ...

What You Need to Do to Be HIPAA Compliant After Signing a BAA
Before agreeing to trust another business with your data, there are several precautions you need to take. Firstly, ...

How to Ensure HIPAA Compliance While Storing PHI on the Cloud
For healthcare companies, cloud data storage is a popular and practical alternative. The worldwide Healthcare ...

Your Cybersecurity Questions Answered!
Thanks to everyone who attended our November 4th webinar, Don’t Become the Next Cybersecurity Scary Story! We are ...

How to Maintain HIPAA Compliance in Public Cloud Environments
The benefits of public cloud computing solutions make them very attractive to all types of businesses. One of the ...

Password Manager Recommendations for Simpler, Better Security
A Password Manager Can Help Pave the Way to HIPAA Compliance
We’re all storing more information online than ...

Why You Should Be Using Two-Factor Authentication
While strong, complex passwords are an effective first line of defense when securing business accounts and ...
Take control of your compliance.
