Looking for a Business Associate Agreement? Download our FREE template.

Total HIPAA Logo

Top Ten Total HIPAA Blogs of 2016 (Part 1)

Total HIPAA published 34 blogs in 2016 covering topics from HHS audits to HIPAA compliant file sharing services. For our final two blogs of 2016, we have compiled a Top 10 Blogs of 2016 list based on our most visited and cited blogs this year.

A significant number of the blogs on our list deal with technical guidance. In April 2016, eVisit ranked Total HIPAA the #1 health tech blog in the Top 100 Blog Report. In their review, eVisit cautioned readers, “Don’t risk HIPAA breaches! This blog is like data security boot camp.” We have continued to address technical topics needed to meet HIPAA requirements to be your one-stop shop for a HIPAA compliance solution and guidance on implementing the HIPAA law.

Based on your clicks, here are Total HIPAA’s Top 10 Blogs of 2016! Beginning with #10. Next week we will continue the countdown to #1.

Top Ten Count Down

    1. Bring Your Own Devices (BYOD) Guidance

Before an employer allows employees to use their own electronic devices (phones, computers, tablets, etc) on the organization’s network, there are many factors to consider. This blog summarizes the current state of BYOD and considerations for your business if you plan on adopting a policy.

    1. HHS is Focusing in on Small Breaches

On August 18, 2016 OCR announced:, “Beginning this month, OCR has begun an initiative to more widely investigate the root causes of breaches affecting fewer than 500 individuals.” In this blog we outlined the precautions organizations should take to protect their PHI.

    1. Update: HIPAA Compliant File Sharing

File sharing applications allow you to easily store, share, control, and protect important files in the cloud. This is an update to an earlier filesharing blog. We reviewed 5 of the top HIPAA compliant, cloud-based, file sharing applications, and provided a basic overview of each application as well as the security measures, the setup, and the pricing.

    1. A Real-World Breach: Why HIPAA Compliance Matters

Developing and implementing a HIPAA compliance plan can often seem like preparing for a tornado on a sunny day. You’ve never had a breach before and you don’t foresee an Office for Civil Rights (OCR) audit anytime in the near future. However, as one of our clients recently discovered, it pays to be prepared because tornadoes hit unexpectedly. A client’s Business Associate had a breach. So they called us with the big question: “What is our liability?” We answer this question and more in this blog.

    1. Encrypting Devices

Encrypting your data adds an extra layer of protection to your files by minimizing the risk of a breach if your device is lost or stolen. Total HIPAA has a beginner’s guide to encrypting your computers, smart devices, and tablets so you can have that peace of mind.

Sharing is caring!

Documents

Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.


Download Now

Want to stay informed?

Join our community, stay ahead of the curve on HIPAA compliance and receive free expert guidance.

State of HIPAA Compliance in 2024

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!

Document

Related Posts

What is Access Control in terms of HIPAA?

What is Access Control in terms of HIPAA?

Access control, in terms of cybersecurity, refers to the practice of managing and regulating who can access specific resources, systems, or data within an organization's network or information...

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)