


What You Need to Do to Be HIPAA Compliant After Signing a BAA
Before agreeing to trust another business with your data, there are several precautions you need to take. Firstly, make sure you have audited a Business Associate or Subcontractor’s HIPAA compliance program before signing a Business Associate Agreement (BAA) with...
Your Cybersecurity Questions Answered!
Thanks to everyone who attended our November 4th webinar, Don’t Become the Next Cybersecurity Scary Story! We are grateful to our guest experts, Sean Nobles from NaviSec and Brett Haines from Atlantic.Net, for joining us. We discussed social engineering, PenTesting,...
How to Maintain HIPAA Compliance in Public Cloud Environments
The benefits of public cloud computing solutions make them very attractive to all types of businesses. One of the advantages offered by public cloud vendors is the availability of advanced technology and the ability to configure systems to meet the needs of any...
Why You Should Be Using Two-Factor Authentication
While strong, complex passwords are an effective first line of defense when securing business accounts and applications, they are not fool proof and can be compromised if a hacker gains access to company systems. Two-factor authentication (2FA), also known as...