A Trusted IT Resource Can Help Your Organization Rapidly Adjust For Remote Working Environments

The coronavirus (COVID-19) outbreak is causing businesses around the world to reexamine their operational structure. Companies now need to plan and prepare for employees to work remotely without any interruption to normal business functions, if they plan to stay competitive ...

Famous Last Words: My IT Guy Has It Handled

Too many businesses fall into the trap of letting their internal or outsourced IT resource manage their cyber security. At first, this may not seem like a trap at all; these are the IT experts, your managed services provider, and ...

Everything You Need to Know About Reviewing Business Associate Agreements

Did you know that business associate agreements are mandatory under the HIPAA privacy rule? If you don’t have these agreements in place, you’ll fail a HIPAA audit. The good news is that you can avoid the consequences that come with ...

Keys to HIPAA Compliance

When your organization completes a risk analysis, you’re on the path to HIPAA compliance but it’s just one step. Once you do a risk analysis, you then need to put plans in place to address these risks. In this post, ...

Risk Analysis: What is it and Where Does it Fit in a HIPAA Audit?

When is the last time your organization conducted a risk analysis? For most organizations, the answer is far too long ago. It may ...

Why Do You Need To Organize for HIPAA Audits?

Are you HIPAA compliant? Many organizations struggle to answer this question for good reason. HIPAA compliance is complicated. The good news? ...

Is Your Organization Ready for a HIPAA Audit?

Is your organization prepared for a HIPAA audit? If you aren’t or you’re not sure, you’re not alone. Many organizations aren’t ...

Hackers turning to corporate "big fish" in quest to steal data

In their never-ending quest to find new ways to run scams or access critical business data, hackers have been taking aim on ...

In wake of the Wikileaks-CIA disclosures, an unflashy strategy for data security.

The Wikileaks disclosure earlier this month about CIA hacking tools illustrates a harsh truth in today’s technology world: For all of the ...

Five cyber-security predictions for 2017

Over the past few months, we’ve seen a lot of headlines – ranging from the cyber attacks on Yahoo to security breaches ...