If you're thinking of hiring a Penetration Testing service, you definitely need to do your due diligence. There's a wide range of services that penetration testing firms offer, ranging from cheap automated scans to manual expert exploit detection. As part of your due diligence process, here are 14 questions that you should consider asking the [...]
Transcript: Hi there. A a few months back, a client asked us to speak to a new vendor that they were thinking about doing business with. The cost of doing business with our client is that they were asking this vendor to sign what's called a HIPAA Business Associate agreement. If you're watching this video, you're probably [...]
We'd like to answer one of the most common questions that we get about HIPAA compliant email. One of the visitors to our site asked us... "How is the e-mail encrypted when the client/patient responds to your encrypted e-mail you send to them? I understand the e-mail you send to them is encrypted, but I [...]
Last week, we were sitting in a conference room with 20 people. These were smart people. All highly educated. They all use computers every single day. We were talking to them about ways to keep safe online. The conversation ranged from phishing to ransomware to staying safe at home. It was fun to be with [...]
A lot of companies make a huge mistake when it comes to G Suite and HIPAA. They think that all they have to do is sign a HIPAA Business Associate Agreement (BAA) with Google, and they're suddenly HIPAA compliant. Nothing could be further from the truth. Here's the story of Ted (not his real name). [...]
Health care providers must follow the Health Insurance Portability and Accountability Act (HIPAA). Is Office 365 HIPAA compliant, though? This act protects your patient healthcare data (PHI). As more clinicians are electronically transmitting patient records and other personal information to specialists and medical facilities, it is imperative that we ensure that information is secure. Isn’t [...]
So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]
You can use email securely and still remain compliant with HIPAA. Here are seven tips for securely using email in a HIPAA-compliant organization.
Practical tips to find the best HIPAA compliant hosting for your business.
Is Gmail secure? Let's walk through the security features they have, and think about how they work in the real world. 1) Is Gmail Secure against Phishing? Hackers use "phishing" attacks to either steal your data or get control of your computer. They'll send you an email with either a link or an attachment. [...]