<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Do I Need Encryption and Multi-factor Authentication for GLBA Compliance?

The Gramm-Leach-Bliley Act (GLBA) also known as the Financial Modernization Act is a United States Federal Law enacted[…]

4 Ways Cloud and Mobile are Affecting your Compliance with SSAE 18

Cloud and mobile services have not only disrupted traditional business models but have also created challenges when it[…]

What you should know about THE HIPAA PRIVACY RULE

Does the HIPAA Privacy rule affect you? You should be familiar with the Health Insurance Portability and Accountability[…]

Five Steps to HIPAA Compliance for a Doctor's Office

Why do you, as a doctor, dentist or any other medical provider, need to comply with HIPAA? HIPAA, the Health Insurance[…]

10 Steps to help prevent Breaches of PHI

You may have heard of healthcare organizations struggling to comply with HIPAA. The Health Insurance Portability[…]

Do Dentists Need To Comply With HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Phase 3 of NY Cybersecurity Regulation is due by September 1, 2018/ March 1, 2019

This is the third part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]
Subscribe to our Blog!