Total HIPAA published 34 blogs in 2016 covering topics from HHS audits to HIPAA compliant file sharing services. For our final two blogs of 2016, we have compiled a Top 10 Blogs of 2016 list based on our most visited and cited blogs this year.
A significant number of the blogs on our list deal with technical guidance. In April 2016, eVisit ranked Total HIPAA the #1 health tech blog in the Top 100 Blog Report. In their review, eVisit cautioned readers, “Don’t risk HIPAA breaches! This blog is like data security boot camp.” We have continued to address technical topics needed to meet HIPAA requirements to be your one-stop shop for a HIPAA compliance solution and guidance on implementing the HIPAA law.
Based on your clicks, here are Total HIPAA’s Top 10 Blogs of 2016! Beginning with #10. Next week we will continue the countdown to #1.
Top Ten Count Down
Before an employer allows employees to use their own electronic devices (phones, computers, tablets, etc) on the organization’s network, there are many factors to consider. This blog summarizes the current state of BYOD and considerations for your business if you plan on adopting a policy.
On August 18, 2016 OCR announced:, “Beginning this month, OCR has begun an initiative to more widely investigate the root causes of breaches affecting fewer than 500 individuals.” In this blog we outlined the precautions organizations should take to protect their PHI.
File sharing applications allow you to easily store, share, control, and protect important files in the cloud. This is an update to an earlier filesharing blog. We reviewed 5 of the top HIPAA compliant, cloud-based, file sharing applications, and provided a basic overview of each application as well as the security measures, the setup, and the pricing.
Developing and implementing a HIPAA compliance plan can often seem like preparing for a tornado on a sunny day. You’ve never had a breach before and you don’t foresee an Office for Civil Rights (OCR) audit anytime in the near future. However, as one of our clients recently discovered, it pays to be prepared because tornadoes hit unexpectedly. A client’s Business Associate had a breach. So they called us with the big question: “What is our liability?” We answer this question and more in this blog.
Encrypting your data adds an extra layer of protection to your files by minimizing the risk of a breach if your device is lost or stolen. Total HIPAA has a beginner’s guide to encrypting your computers, smart devices, and tablets so you can have that peace of mind.