<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

How you can obtain access to your Protected Health Information (PHI)

Have you ever wanted to dig deep into all your Protected Health Information (PHI) and see what information the doctors[…]

Are you accidentally disclosing patient information?

If you are accidentally disclosing Patient information, also known as PHI, you are causing a data breach for your[…]

FedRAMP 101: Becoming a FedRAMP Authorized CSP (Cloud Service Provider)

What is FedRAMP? FedRAMP (Federal Risk and Authorization Management Program) is an assessment and authorization process[…]

Does Your Business Need Cyber Insurance?

So you don’t have cyber insurance? You’re in the same boat as about half of U.S. firms, according to the Insurance[…]

Top 10 tips to stay secure online while traveling this summer

Summer is the time to enjoy traveling and vacations, but do not be lax with your cyber hygiene and follow these top 10[…]

Do Dentists Need To Comply With HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Phase 3 of NY Cybersecurity Regulation is due by September 1, 2018/ March 1, 2019

This is the third part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]
Subscribe to our Blog!