15 Lessons Learned from a HIPAA Data Breach

Posted by Rose Doherty on Jul 25, 2018 1:14:14 PM

HIPAA-IT-Security-and compliance

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Read More

Topics: HIPAA Compliance, Data Security, IT Security, cybersecurity, ePHI Security, HIPAA Risk Analysis

3 Reasons to Implement a Corporate Owned Device Policy

Posted by Rose Doherty on Jun 19, 2018 8:15:00 AM

 

The AP reported a few weeks ago that a team-issued iPad was stolen from the car of a Chicago Bears Rookie, and the Bears Playbook was on the iPad!  Fortunately, the Bears Organization had implemented a corporate owned device  policy, which allowed the IT Department to take control fast.

Read More

Topics: Mobile Device Management, cybersecurity, corporate owned device policy, byod, cybersecurity plan

Microsoft and TruGrid Announce Remote Desktop Protocol Licensing Agreement

Posted by Rose Doherty on Apr 6, 2018 11:31:25 AM
Microsoft Corp. and TruGrid (N.E. Desktop Software, Inc.) announced on April 3, 2018 that they have entered into a license agreement to enable access to Microsoft's Remote Desktop Protocol (RDP) technology for TruGrid's Simple & Secure Workspace, hosted in Microsoft Azure. 
Read More

Topics: cybersecurity, cloud security, Secure remote access, Protect your data in the cloud, TruGrid, Remote access security

8 Tips from the OCR to Prevent a Phishing Attack

Posted by Rose Doherty on Mar 14, 2018 1:23:17 PM

February 2018 OCR Cybersecurity Newsletter - Phishing

Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and  The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.  

Read More

Topics: IT Security, cybersecurity strategies, prevent a phishing attack, cybersecurity, cybersecurity tips

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all