<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Preparing for HITRUST Certification

Six Things You Should Know As the volume of data has exploded in the information age, an increasingly complex web of[…]

Hospitals Under Attack!

Why it’s happening now, and what to do about it Just as the COVID pandemic created new opportunities for hackers,[…]

Top 3 Tips For Security and Privacy In Telehealth

Currently, the entire globe is experiencing its universal lockdown. With the looming threat of COVID-19, people have[…]

Quarantine Times 2020, a Playlist for Uncertain Times

We know that times of uncertainty can be bewildering, so we wanted to share with you Quarantine Times 2020, a playlist[…]

How to prevent a communications breakdown between the IT Security Team and the C-Suite/ Board of Directors?

This blog post was first published on December 6, 2016, but has been updated in August 2019 to reflect some new high[…]

Why Ignoring the Minimum Necessary Standard in HIPAA Could Cost You

Does your healthcare organization develop and implement policies and procedures that are appropriate and reflect your[…]

How HIPAA Helps Strengthen Patient Trust

Trust is a vital factor that affects the success of any relationship, whether it be personal or professional. Without[…]

MACRA/MIPS and the Annual Security Risk Assessment!

How does MACRA/MIPS affect your practice? As a healthcare provider, you should be familiar with the Merit-based[…]

New HHS Rule for better patient data access

New Rule for Interoperability, Information Blocking, and the ONC Health IT Certification Program The US Department of[…]

Six Common HIPAA Violations and how you can prevent them

HIPAA compliance is an ongoing process. Do you have security and privacy policies and procedures for your organization?[…]
Subscribe to our Blog!