THE TOTAL HIPAA
Resource Library
Featured Articles
Is Gmail’s Confidential Mode HIPAA Compliant?
Gmail is exceedingly popular among email users for both personal and business purposes — and for good reason. It’s the second most widely-used email platform, after Apple Mail. It’s well run, user...
Basic HIPAA Guidelines: Annual Update 2022
We recently hosted a webinar, “Annual HIPAA Requirements and Security Standards,” in which we discussed annual HIPAA requirements, document review, and the compliance procedures you need to have in...
Working Remotely While Staying HIPAA Compliant: Using a Virtual Private Network (VPN) vs. SSL/TLS in a HIPAA Environment
Whether you’re working from home, your local coffee shop, or from the airport between layovers, you will likely need to connect to your organization’s network. A public or personal Wi-Fi network is...

5 Common HIPAA Mistakes
Now more than ever, HIPAA compliance is a must. It’s hard to believe, but HIPAA violations can soar to over ...

HIPAA Compliance Will Stop Ransomware’s Damage
On average, there have been 4,000 daily ransomware attacks since early 2016, an increase of 300% from the 1,000 ...

WannaCry Ransomware Protection with HIPAA
WannaCry, WannaCrypt, Wana Decryptor or WCry, whatever it is called, ransomware has been spreading through over ...

Creating and Managing Passwords
How many times a day do you access applications or websites that require passwords? The temptation is to make ...

Malicious Social Engineering and HIPAA
Spam accounts for 65% of the total volume of global internet email traffic according to Cisco’s 2017 Annual ...

HIPAA Violations Every Day and Every Size
We frequently get questions about whether or not an event is a HIPAA violation. Some of the events are hazy, ...

HIPAA and Medical Records Retention Requirements by State
The Health Insurance Portability and Accountability Act (HIPAA) requires Covered Entities and Business Associates ...

Auditing Business Associates
Have you Audited your HIPAA Business Associates?
This question comes up frequently when we are working on HIPAA ...

Implementing HIPAA is More Than Meeting Government Regulations
Recently, I was on a vacation in Germany, and as I visited several medieval cities, I had two thoughts. First, ...

The FTC Act and HIPAA Protect the Same Information
You collect Personally Identifiable Information (PII) about your patients, employees and clients, which can be ...

Microsoft End of Support for 2017
Note: We update this list every year. To see the most recent version of this post, click here.
There are numerous ...

It’s Time to Report Small Breaches
Deadline for Reporting HIPAA Breaches Affecting Fewer than 500 Individuals – February 28, 2017
HIPAA breaches ...

Are You Prepared for Ransomware?
Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order ...

HIPAA and Cloud Computing Part II
Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to ...

Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra ...

HIPAA Compliant Email Encryption Review
Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they ...

OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates ...

Multi-Line Agencies and Privacy Requirements
It's important to train all staff in a multi-line agency on HIPAA Compliance
There is a great deal of crossover ...

Strong Passwords – Your Employees Most Important Contribution to Network Security
Are your passwords so easy that a seven year old can figure them out?
In 2012, Dropbox verified that the user ...

Update: Disaster Recovery
In the midst of tropical storm season, we want to remind you of the importance of a Disaster Recovery Plan. The ...
Take control of your compliance.
