TOTAL HIPAA
Free Resources
 HIPAA Blogs, Podcasts, and Webinars at Your Fingertips

Are You Prepared for Ransomware?
Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order to release the blocked access. Businesses are not preparing ...

HIPAA and Cloud Computing Part II
Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to begin for business associates with desk audits in November ...

Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra protection to your files by minimizing the risk of a breach in ...

HIPAA Compliant Email Encryption Review
Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they store and come in contact with at rest, storage and transit. ...

OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates in October motivated a Covered Entity’s compliance officer ...

Multi-Line Agencies and Privacy Requirements
It's important to train all staff in a multi-line agency on HIPAA Compliance
There is a great deal of crossover within a multi-line agencies. Cross-selling group or ...

Strong Passwords – Your Employees Most Important Contribution to Network Security
Are your passwords so easy that a seven year old can figure them out?
In 2012, Dropbox verified that the user information of 68 million Dropbox users was stolen. This ...

Update: Disaster Recovery
In the midst of tropical storm season, we want to remind you of the importance of a Disaster Recovery Plan. The most recent storm, Hermine, has caused floods and flash ...

Bring Your Own Device (BYOD) Guidance
Bring Your Own Device, or BYOD, is when employers allow their employees to use their own electronic devices (phones, computers, tablets, etc.) on the organization's ...

HHS is Focusing in on Small Breaches
If you think HIPAA won’t be enforced for small breaches, think again. On August 18, 2016, OCR announced its intent to focus in on smaller breaches. The announcement states ...
Featured Resources

Is Gmail HIPAA Compliant?
Gmail is not automatically HIPAA compliant, however, you can implement security measures…
Read More →

Free Download: HIPAA 101
How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key…
Download Now →

How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become…
Read More →

Free Webinar: Annual HIPAA Requirements & Security Standards
In this webinar, we discussed annual HIPAA requirements, document review, and the compliance…
Watch Now →
Join Thousands of
Satisfied Organizations
Streamline your compliance with Total HIPAA and reclaim valuable time for your core business.
