<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office of Civil Rights (OCR) and National Institute of Standards and[…]

Do I Need Encryption and Multi-factor Authentication for GLBA Compliance?

The Gramm-Leach-Bliley Act (GLBA) also known as the Financial Modernization Act is a United States Federal Law enacted[…]

4 Ways Cloud and Mobile are Affecting your Ability to Comply with SSAE 18

Cloud and mobile services have not only disrupted traditional business models but have also created challenges when it[…]

What you should know about THE HIPAA PRIVACY RULE

Does the HIPAA Privacy rule affect you?   You should be familiar with the Health Insurance Portability and[…]

Five Steps to HIPAA Compliance for a Doctor's Office

Why do you, as a doctor, dentist or any other medical provider, need to comply with HIPAA? HIPAA, the Health Insurance[…]

10 Steps to help prevent Breaches of PHI

You may have heard of healthcare organizations struggling to comply with HIPAA. The Health Insurance Portability[…]

Do Dentists need to comply with HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Phase 3 of NY Cybersecurity Regulation is due by September 1, 2018/ March 1, 2019

This is the third part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]