The 9 HIPAA Mistakes We See All the Time

As part of our HIPAA and Cybersecurity Reviews for Small Practices, we get to see lots of HIPAA mistakes.  It’s interesting to spot the similarities across so many different companies. Here are nine of the most common HIPAA mistakes that we see. The scary part is we see them all the time. HIPAA Mistake 1: [...]

By | 2017-08-15T15:19:26+00:00 August 8th, 2017|HIPAA|2 Comments

How to Make Gmail HIPAA Compliant

Google’s email, calendar, and productivity tools (recently renamed to “G Suite”) are absolutely fantastic.  They’re easy to use and very affordable. G Suite is also highly secure, but there are very specific things that you need to do to make G Suite / Gmail HIPAA-compliant.  Here are some big ones... Disclaimer: we are not lawyers. [...]

By | 2017-09-19T20:48:22+00:00 August 3rd, 2017|Cloud Cyber Security, HIPAA|1 Comment

Is Microsoft Azure HIPAA Compliant?

Thinking about moving some services to the cloud?  Is Microsoft Azure HIPAA compliant and suitable for ePHI? A client wanted to use Microsoft Azure as a HIPAA-compliant disaster recovery site, so we took a look. Here’s what we found about Microsoft Azure and HIPAA compliance. Will Microsoft Azure sign a HIPAA Business Associate Agreement? Any [...]

By | 2017-05-04T12:45:37+00:00 April 26th, 2017|Cloud Cyber Security, HIPAA|0 Comments

Is Google Cloud Platform HIPAA Compliant?

Thinking about moving some services to the cloud?  Let’s look at whether Google Cloud Platform HIPAA compliance. We recently helped a medical company evaluate Google Cloud Platform (GCP) as a disaster recovery site. Here’s what we found about Google Cloud Platform and HIPAA compliance. Will Google Cloud Platform sign a HIPAA Business Associate Agreement? Any [...]

By | 2017-06-12T21:22:24+00:00 April 11th, 2017|Cloud Cyber Security, HIPAA|0 Comments

5 Free Cyber Security Tips for Windows Users

If you’re a Windows user, here are five free things you should do right now. These will help you with your HIPAA compliance and reduce the risk that you’ll be hacked. 1) Encrypt your hard drive Use BitLocker, Microsoft’s built-in hard drive encryption utility. You can get instructions here: https://support.microsoft.com/en-us/instantanswers/e7d75dd2-29c2-16ac-f03d-20cfdf54202f/turn-on-device-encryption 2) Take a screenshot to prove your laptop [...]

By | 2017-04-06T18:09:45+00:00 April 6th, 2017|Computer Cyber Security|2 Comments