IT Solutions Blog

15 Lessons Learned from a HIPAA Data Breach

Posted by Rose Doherty on Jul 25, 2018 1:14:14 PM

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Read More

Topics: HIPAA Compliance, Data Security, IT Security, cybersecurity, ePHI Security, HIPAA Risk Analysis

3 Reasons to Implement a Corporate Owned Device Policy

Posted by Rose Doherty on Jun 19, 2018 8:15:00 AM

 

The AP reported a few weeks ago that a team-issued iPad was stolen from the car of a Chicago Bears Rookie, and the Bears Playbook was on the iPad!  Fortunately, the Bears Organization had implemented a corporate owned device  policy, which allowed the IT Department to take control fast.

Read More

Topics: Mobile Device Management, cybersecurity, corporate owned device policy, byod, cybersecurity plan, cybersecurity checklist

Microsoft and TruGrid Announce Remote Desktop Protocol Licensing Agreement

Posted by Rose Doherty on Apr 6, 2018 11:31:25 AM
Microsoft Corp. and TruGrid (N.E. Desktop Software, Inc.) announced on April 3, 2018 that they have entered into a license agreement to enable access to Microsoft's Remote Desktop Protocol (RDP) technology for TruGrid's Simple & Secure Workspace, hosted in Microsoft Azure. 
Read More

Topics: cybersecurity, cloud security, Secure remote access, Protect your data in the cloud, TruGrid, Remote access security

8 Tips from the OCR to Prevent a Phishing Attack

Posted by Rose Doherty on Mar 14, 2018 1:23:17 PM

February 2018 OCR Cybersecurity Newsletter - Phishing

Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and  The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.  

Read More

Topics: IT Security, cybersecurity strategies, prevent a phishing attack, cybersecurity, cybersecurity tips