TOTAL HIPAA
Free Resources
 HIPAA Blogs, Podcasts, and Webinars at Your Fingertips

The Value of Healthcare Data
The rising number of healthcare hacks demonstrates that healthcare data has tremendous value in the wrong hands. Some experts call 2015 "the year of the healthcare hack." ...

It’s Time to Report Small Breaches – Don’t Miss the Deadline
HIPAA breaches involving less than 500 individuals during the calendar year 2015 must be reported to the U.S. Department of Health and Human Services (HHS) by Monday, ...

What is a Zero-Day Security Flaw?
As you have been developing, updating and improving your HIPAA Security Plan, you have probably come across the term zero-day. To most IT departments this is a very common ...

It’s Time to Upgrade Your Internet Explorer NOW and Forever
Upgrading software is a pain! Updates seem to pop up at the most inopportune time. You have to budget time to download the patch and then your system is out of commission for ...

Infographic: 9 Important Items Disaster Recovery Plans Should Include
Reading through pages of HIPAA articles and advice about disaster recovery plans can be daunting.
Here's an easy way to understand the 9 most important items disaster ...

HIPAA Compliance Must Be Updated As Technology Evolves
The HIPAA Security Rule was enacted in 2003. Since then, there have been two major changes to the Rule, first in 2009 with the HITECH Act and most recently in 2013 with the ...

Business Associates Must Take HIPAA Compliance Seriously
As part of the HIPAA Omnibus ruling in 2013 Business Associates (BAs) of Covered Entities are required to comply with HIPAA Privacy and Security guidelines. Not much ...

Help Employees Support Your HIPAA Security Efforts
Studies show that the weakest link in HIPAA security is employee compliance and it’s no wonder, their day is already filled with numerous deadlines and requests, not to ...

Protect Your Business from Disaster with HIPAA
10 years ago Hurricane Katrina destroyed southern Louisiana and Mississippi.
Annual hurricane season is just cranking up here on the east coast, and we’ve already seen a ...

HIPAA Compliant Email Encryption Review
Does HIPAA require your company to implement encryption?1 Yes, and No. Simply put, the law doesn’t require encryption, but trust me, after you do a thorough Risk Assessment, ...
Featured Resources

Is Gmail HIPAA Compliant?
Gmail is not automatically HIPAA compliant, however, you can implement security measures…
Read More →

Free Download: HIPAA 101
How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key…
Download Now →

How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become…
Read More →

Free Webinar: Annual HIPAA Requirements & Security Standards
In this webinar, we discussed annual HIPAA requirements, document review, and the compliance…
Watch Now →
Join Thousands of
Satisfied Organizations
Streamline your compliance with Total HIPAA and reclaim valuable time for your core business.
