Posts

cube hands security

Does HIPAA regulation cover your business? There are two categories of entities who are regulated by HIPAA and are required to be in full compliance.

Covered Entity – This is the main focus of the original law. Covered entities are those who, in their normal activities, create, maintain, directly access and/or transmit PHI and ePHI. Examples of these entities are healthcare providers, clearinghouses, insurance plans, and employers who self-insure. [Note: In general a specific individual is not considered a covered entity. Their employer is the covered entity. Individuals, however, still have a duty to support and ensure compliance and would likely face disciplinary action by their employer for individual behaviors that compromise compliance. Their employer would be the target of OCR fines and penalties.

Read more

hippa fines

For most of us, HIPAA is just some strange acronym for a law we stumble across everytime we visit a doctor’s office or medical clinic. Something about signing to allow the office to have access to your medical records so they can treat you. Or something like that. However, if your business has a professional relationship with a medical office, hospital, healthcare provider or health insurance plan, you may well be regulated by HIPAA. This matters because failing to abide by HIPAA privacy regulations can result in serious penalties. Just as an example, check out these dollar figures from HHS, who administers HIPAA.

Read more

multi factor authentication

You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. So, what is multi-factor authentication, exactly? Read this blog to find out.
Read more

hacker laptop

The dark web is essentially a marketplace for cyber criminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold by miscreants, to miscreants, who can later hack into your system or extort money from you to prevent a data leak and so on.

Read more

medical dental support

No doubt, having an MSP to manage the IT requirements of your dental practice offers multiple benefits. But, be sure to consider the following before you sign up with one.

Read more

data files cabinet folders

IT checklists are a great way to analyze, understand and take the necessary steps to meet your IT requirements. In this blog, we discuss 2 of the 5 important IT checklists–Hardware/software and Cybersecurity.
Read more

users security mobility

As a business, you are probably aware of the term, cyber insurance. With the cybercrime rates rising consistently, cyber insurance is increasingly becoming a necessity for survival. Here are a few things to consider before you sign up with a cyber insurance service provider.

Read more

tech shield

What is cyber insurance

With cybercrime becoming a major threat to businesses across the world, irrespective of their size, cyber insurance is fast becoming a necessity more of a necessity than a choice. However, the concept of cyber insurance is still fairly new and not many SMBs are aware of its benefits. Cyber insurance is an insurance that covers your liability in the event of your business becoming a victim of cybercrime. For example, a data breach puts you at risk of lawsuits, makes you liable to your customers/other parties whose data has been compromised because of/via your organization. Cyber insurance covers the financial aspect of such liabilities, making it easier for you to deal with them.

Read more

4 ways to protect your data

When you look at all the ways that your data can be placed at risk, it can be pretty discouraging. As discussed in our last two blogs, data is at risk from bad actors, failed hardware, human error and external events largely beyond anyone’s control. However, there are a range of solutions, some of which can be money-saving, that can help mitigate risk. Here are four key areas on which to focus.

Read more

data risk hardware software and the threats around us

Aside from human error and the work of bad actors, our data faces others risks. In particular, the failure of your hardware and software to protect as designed, and the numerous external threats that exist, largely beyond anyone’s control.

Read more