


Are You Prepared for Ransomware?
Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order to release the blocked access. Businesses are not preparing for the inevitable. It is easy pickings for hackers. The question is not will you face this...
HIPAA and Cloud Computing Part II
Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to begin for business associates with desk audits in November 2016. OCR is randomly selecting business associates for these desk audits from a pool of...
Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra protection to your files by minimizing the risk of a breach in the event your device is lost or stolen. This is because an encrypted and password protected...
HIPAA Compliant Email Encryption Review
Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they store and come in contact with at rest, storage and transit. Today we are going to be discussing your options for protecting ePHI in transit;...