


How to Maintain HIPAA Compliance in Public Cloud Environments
The benefits of public cloud computing solutions make them very attractive to all types of businesses. One of the advantages offered by public cloud vendors is the availability of advanced technology and the ability to configure systems to meet the needs of any...
Password Manager Recommendations for Simpler, Better Security
A Password Manager Can Help Pave the Way to HIPAA Compliance We’re all storing more information online than ever before. The average Internet user has at least 90 online accounts, and within three years, researchers estimate the number may triple.1 You likely have...
Why You Should Be Using Two-Factor Authentication
While strong, complex passwords are an effective first line of defense when securing business accounts and applications, they are not fool proof and can be compromised if a hacker gains access to company systems. Two-factor authentication (2FA), also known as...
PHI Retention Requirements: A Complete Guide for HIPAA Compliance
Introduction: Understanding PHI Retention In healthcare and associated industries, retaining Protected Health Information (PHI) is critical to regulatory compliance. Knowing how long to hold onto PHI is essential for HIPAA compliance, safeguarding patient data, and...