Secure Your Network: 3 Tips for Safer Wi-Fi

As much as we like to think it doesn’t happen, online hacks and information thefts are an everyday occurrence and can be devastating to a business with sensitive or valuable information. In order to create a secure Wi-Fi network for your business, follow these 3 steps. 1. Choose an inconspicuous network name (SSID). First things […]

Why Local-Only or Cloud-Only Backups are Risky Business

When it comes to protecting and managing your data (and your business), it’s important to think in terms of business continuity — not just data backups. It’s true, however, that data backups are a necessary aspect of protecting your business’s data — it’s how and where you back it up that matters. Understanding Business Continuity […]

The Top 6 Websites for Healthcare IT News

Being up-to-date in your industry is important for any job, but is even more crucial in the evolving world of healthcare IT. Thankfully, these six sites make it easy to keep up with breaking stories, tech updates, industry trends, and more. 1. Healthcare IT News Healthcare IT News is a great source for news in […]

Top 5 Tips for Creating and Securing Passwords

As cybercrimes continue to surface at an alarming rate, hacktivist attacks and online information thefts are becoming an everyday occurrence, putting us all at a greater risk than ever before. From the 2018 Macy’s data breach to phishing and malvertising, there is an obvious trend of instability within the online realm when it comes to […]

The HITECH Act’s Health IT Infrastructure Standards and Requirements

The HITECH (Health Information Technology for Economic and Clinical Health) Act was passed in 2009 as part of the American Recovery and Reinvestment Auto of 2009 (ARRA). This piece of legislation was created to accelerate the adoption of electronic health records (EHRs), and its supporting technology, in U.S. healthcare organizations. The 7 major goals of the HITECH […]

e-PHI Data Security: What is e-PHI Data Theft?

PHI stands for protected health information and includes just what it sounds like: identifiable information in a person’s health data records, such as health details, date of birth, Social Security number, fingerprints, photos/images, and even financial information. e-PHI is the same thing, it’s just used, held, and transmitted via electronic form (there are actually 18 […]

Technology Considerations for an Office Move

Whether your business is moving to a new location or you’ve outgrown your current office space, a bad location or an increasingly cramped office space is never ideal. Moving to a new (better) location or simply a larger office space can often do wonders for the growth of a business, but there’s still a lot […]

HIPAA Security Rule Part 2: General Data Security Rules for Electronic Protected Health Information

In part 1 of the HIPAA Security Rule blog series, we introduced you to healthcare data security basics, or in other words, what the HIPAA Security Rule is, what the primary objectives are, and what kind of information is protected by the HIPAA Security Rule. Below, and as part 2 of this series, we are […]