HIPAA Compliant Cloud Storage – 11 Services Reviewed (Updated)

“What are my options for HIPAA compliant cloud storage? ” In recent years, cloud storage has risen in both effectiveness and popularity. Its convenience is undeniable– the ability to access your data from anywhere is amazing. But can business associates and medical providers take advantage of these services to store PHI? What exactly does [...]

By |2019-01-04T20:03:42+00:00December 6th, 2018|Cloud Cyber Security, HIPAA|4 Comments

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The [...]

By |2019-01-04T04:14:12+00:00December 5th, 2018|Computer Cyber Security, Email Cyber Security|0 Comments

Hiring a Penetration Testing Service? 14 Questions to Ask a Reference

If you're thinking of hiring a Penetration Testing service, you definitely need to do your due diligence. There's a wide range of services that penetration testing firms offer, ranging from cheap automated scans to manual expert exploit detection. As part of your due diligence process, here are 14 questions that you should consider asking the [...]

By |2019-01-04T04:12:00+00:00December 2nd, 2018|Computer Cyber Security|0 Comments

Should You Sign a HIPAA Business Associate Agreement?

Transcript: Hi there.  A a few months back, a client asked us to speak to a new vendor that they were thinking about doing business with.  The cost of doing business with our client is that they were asking this vendor to sign what's called a HIPAA Business Associate agreement.  If you're watching this video, you're probably [...]

By |2019-01-04T20:06:00+00:00December 2nd, 2018|HIPAA|0 Comments

Is Office 365 HIPAA compliant?

Health care providers must follow the Health Insurance Portability and Accountability Act (HIPAA).  Is Office 365 HIPAA compliant, though? This act protects your patient healthcare data (PHI).  As more clinicians are electronically transmitting patient records and other personal information to specialists and medical facilities, it is imperative that we ensure that information is secure. Isn’t [...]

By |2019-02-14T21:09:40+00:00November 14th, 2018|Cloud Cyber Security, Email Cyber Security, HIPAA|1 Comment

13 Fantastic Resources for Writing an Information Security Policy

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]

By |2019-01-04T20:09:25+00:00November 10th, 2018|Computer Cyber Security, HIPAA|0 Comments