<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Detecting Insider Threats

What is an insider threat? According to the computer emergency response team (CERT), when a current or former employee[…]

Is it secure to pay with a credit or debit card at restaurants?

It is every business's responsibility to ensure credit card or debit card security and to protect the data and privacy[…]

NY State Cybersecurity Regulations – Are you prepared?

Are YOU prepared for the New York State Cybersecurity Regulations that are in effect since March 1, 2017? All financial[…]

Security and Privacy for Telemedicine

Security and Privacy for Telemedicine Telemedicine is taking the medical world by storm. And one can easily see why.[…]

HIPAA OCR Enforcement Actions against Business Associates

HHS’ Office for Civil Rights is responsible for enforcing the Privacy and Security Rules on HIPAA covered entities.[…]

Who is a HIPAA Security Officer, and why do you need one?

If you are a medical practice or “covered entity”, you need a HIPAA Security Officer. As required in 45 C.F.R. §[…]

Overview of FERPA for Student Data Privacy

Educational institutions need to comply with the Family Education Rights and Privacy Act (FERPA) of 1974, also called[…]

Announcement of merger

HIPAA-HITECH-SOLUTIONS, Inc. and 24By7Security, Inc. merge to provide higher benefits of common cyber security services[…]

Safeguard your data - Be prepared for a security breach

Encrypt. Secure data in storage and during transmission. Be prepared – it is not “if” but rather “when” you will be[…]

Protecting the Individual – Identifiable and De-Identifiable Health Information

The HIPAA rule sets limits for how and why a patient’s information can be used and who can access this information. A[…]
No More Posts
Subscribe to our Blog!