<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Cybersecurity Issues Can Impact Patient Care

How often do we hear a provider say – “My priority is my patient, I don’t have time for other things”. Well, it is a[…]

Remembering What’s Important

As Memorial Day approaches, our thoughts turn to backyard barbeques, boating, and beer. Sunscreen on our noses, picnics[…]

Crash Course On The Sarbanes Oxley Act

In 2002, the Sarbanes Oxley act was passed. This act is a federal law established to protect shareholders, employees,[…]

Let's Start With The Basics: Security Risk Assessments

Cyber crime is on the rise. New threats and vulnerabilities are discovered every day. Cyber risks are operational risks[…]

Medical Device Security Risks: What Healthcare institutions can do

Medical devices, just like any other Internet of Things (IoT) object, are prone to hackers. These hacks can get[…]

Are religious organizations at risk of being hacked? Seven steps you can take to battle cyber crime

Table of Contents: Examples of cyber attacks against religious organizations Impact of a hack, theft or a breach Seven[…]

Can you Regain Customer Trust After Being Hacked?

Table of Contents: Step 1: Get Cybersecure! Step 2: Be Aggressive! Step 3: Cybersecurity Forever! Step 4: Honesty is[…]

FedRAMP 101: Becoming a FedRAMP Authorized CSP (Cloud Service Provider)

What is FedRAMP? FedRAMP (Federal Risk and Authorization Management Program) is an assessment and authorization process[…]

Do Dentists Need To Comply With HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]
Subscribe to our Blog!