9 min read

What is Azure Virtual Desktop?

By Sean Doherty on 6/13/22 12:20 PM

Competing in today's economy requires employees to have access to their tools whether they are working from home or from the office. Azure VDI is the modern solution to enable your remote workforce. 

Topics: Data Security VDI Azure VDI Virtual Desktop Solution Remote Workforce virtual machines Azure Virtual Desktop
8 min read

The 5 Best Ways to Protect ePHI

By Sean Doherty on 6/6/22 7:58 AM

Healthcare organizations can use these 5 strategies to secure electronic protected health information (ePHI). 

Topics: HIPAA Compliance Data Security Encryption ePHI Security Protected Health Information Protect ePHI HIPAA Security Rule What is ePHI
3 min read

15 Lessons Learned from a HIPAA Data Breach

By Rose Doherty on 7/25/18 1:14 PM

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Topics: HIPAA Compliance Data Security IT Security cybersecurity ePHI Security HIPAA Risk Analysis
3 min read

Encryption Could Have Prevented Data Breach

By Rose Doherty on 2/9/16 3:27 PM

Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records

Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach.  Encryption is like a Get Out of Jail Free Card!  Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record.  These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin.  The worst part is that it could have been easily prevented with one simple and inexpensive security measure.

Topics: HIPAA Compliance Data Security
2 min read

Should You Allow Employees to Use Their Own Devices for Work?

By Rose Doherty on 9/28/15 7:00 AM

BYOD offers many benefits, but you have to consider the IT Security Risks

The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice. "Bring Your Own Device” vs. “Corporate Owned Device”.

Topics: Disaster Recovery Data Security Backup