


Aetna Launches Broker Encryption Requirement
This week, we break down Aetna’s new broker encryption requirement. Read on to learn all you need to know about this new rule. Can you name the five types of cyber-attacks you are most likely to face? Socially engineered malwarePassword phishing...
Top Ten Total HIPAA Blogs of 2016 (Part 2)
The countdown of Total HIPAA’s most popular blogs of 2016 continues this week with #5 through #1. Not surprisingly–the top three are technical topics. If you have any topics you would like us to consider in 2017, please fill out the suggestion form at the end of...
Top Ten Total HIPAA Blogs of 2016 (Part 1)
Total HIPAA published 34 blogs in 2016 covering topics from HHS audits to HIPAA compliant file sharing services. For our final two blogs of 2016, we have compiled a Top 10 Blogs of 2016 list based on our most visited and cited blogs this year. A significant number of...