3 Surprising Gmail HIPAA Mistakes

If you want your Gmail HIPAA compliant, you’re in the right place. Gmail and Google Workspace are wonderful tools for medical practices since they can be HIPAA compliant. Notice I said CAN BE. Gmail and Google Workspace are not HIPAA compliant right out of the box. We help medical practices with making their Google Workspace […]
RIA Cyberattacks: Top 6 that could ruin your firm

Which cyberattacks could hurt your Registered Investment Advisor (RIA) Firm? The truth is, any and all cyberattacks could hurt your firm. So what can you do about it? Simply being aware is the first step, so let’s dive into the top 6 cyberattacks that could hurt or simply ruin your RIA firm. 1) RIA Cyberattacks: […]
Google Voice HIPAA Compliance: 4 Quick and Easy Questions
Is Google Voice HIPAA compliant? This is a common question for healthcare providers and organizations exploring secure communication tools. In this article, we’ll dive into the compliance status of Google Voice, its applicability in healthcare settings, and whether its texting feature meets HIPAA requirements. Download Now: Get our FREE Checklist on Gmail and Google Workspace […]
Third-Party Vendor Risk Management: A How-To Guide

Third-party vendor risk management, or the process of reviewing your third-party vendors, is getting more and more important. Believe it or not, you can blame Target! I’m sure you remember the Target breach which ended with the CEO being fired, the CIO resigning and 40 million customer accounts being exposed. Not to mention the millions […]
The Definitive Guide to Building an Information Security Policy

Need help with your information security policy? You’ve come to the right place! Building an information security policy takes time. As you’ll see in this article, there are a lot of items to cover. But you can do it! This article will help you whether you’re writing a brand new information security policy or revising […]
Building an Incident Response Policy

An important part of any Information Security Policy is an Incident Response Policy. What are you going to do when the bleep hits the fan? Unfortunately, there are so many types of incidents (see below for an example list). But the most important part of the policy is having a process to follow when an […]
Is Google Drive HIPAA Compliant?

Yes, Google Drive can be HIPAA compliant in 2025, but only if you’re careful! That’s the quick answer to “Is Google Drive HIPAA Compliant in 2025?”, Read on to learn how to make Google Drive HIPAA-compliant in 2025. Every day we hear from practitioners who want to use Google Workspace in their medical practice. Google […]
What is Typosquatting?

Typosquatting is a method hackers use to trick you. Attackers can use typosquatting to trick you into visiting a website (so they earn ad revenue at best or steal your data at worst), install malware onto your computer, or combine it with a phishing email. Typosquatting is part of a bigger cybercrime category called cybersquatting. […]
Security Operations Center: Critical Considerations for setting up a SOC

Setting up a Security Operations Center (SOC) is a huge task. It often involves hiring and training staff, licensing and configuring a Security Information and Event Management (SIEM) system and creating numerous processes and procedures. You have options: create your own, outsource the whole thing, or do a combination of the two. The end result […]