<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Overview of FERPA for Student Data Privacy

Educational institutions need to comply with the Family Education Rights and Privacy Act (FERPA) of 1974, also called[…]

How hospitals can protect themselves from ransomware

The world of cyber threats just got even more serious. Forget about corporate espionage just being the stuff of movies,[…]

Happy Data Privacy Day!

Data Privacy Day - held every year on January 28th, and coordinated by the National Cyber Security Alliance (NCSA), is[…]

Announcement of merger

HIPAA-HITECH-SOLUTIONS, Inc. and 24By7Security, Inc. merge to provide higher benefits of common cyber security services[…]

What are honeypots and how they can secure your network

Imagine you are in a hacker’s basement. We’ll call this hacker Alex. Alex is clicking away, focusing on his screen and[…]

Safeguard your data - Be prepared for a security breach

Encrypt. Secure data in storage and during transmission. Be prepared – it is not “if” but rather “when” you will be[…]

Protecting the Individual – Identifiable and De-Identifiable Health Information

The HIPAA rule sets limits for how and why a patient’s information can be used and who can access this information. A[…]

Privacy and Security

As medical offices rely more and more on electronic data, making sure the privacy and security of patients’ health[…]

Who does HIPAA apply to?

If you’re working in or alongside the health care industry, you need to be aware of Health Insurance Portability and[…]
No More Posts
Subscribe to our Blog!