Call Us Today to learn more: 888-646-1616

About Josh Ablett

This author has not yet filled in any details.
So far Josh Ablett has created 40 blog entries.

13 Fantastic Resources for Writing an Information Security Policy

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]

By |2018-10-17T19:34:27+00:00October 1st, 2018|Computer Cyber Security, HIPAA|0 Comments

5 Free Cyber Security Tips for Windows Users

If you’re a Windows user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/instantanswers/e7d75dd2-29c2-16ac-f03d-20cfdf54202f/turn-on-device-encryption 2) Take a screenshot to prove your laptop [...]

By |2018-10-17T19:25:23+00:00September 30th, 2018|Computer Cyber Security|2 Comments

5 Free Cyber Security Tips for Mac Users

If you’re a Mac user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use FileVault, Apple’s built-in hard drive encryption utility. You can get instructions here: https://support.apple.com/en-us/HT204837 2) Take a screenshot to prove [...]

By |2018-12-04T19:57:34+00:00September 29th, 2018|Computer Cyber Security|1 Comment

Is Office 365 HIPAA compliant?

Health care providers must follow the Health Insurance Portability and Accountability Act (HIPAA).  Is Office 365 HIPAA compliant, though? This act protects your patient healthcare data (PHI).  As more clinicians are electronically transmitting patient records and other personal information to specialists and medical facilities, it is imperative that we ensure that information is secure. Isn’t [...]

By |2018-10-09T02:54:58+00:00September 28th, 2018|Cloud Cyber Security, Email Cyber Security, HIPAA|1 Comment