Competing in today's economy requires employees to have access to their tools whether they are working from home or from the office. Azure VDI is the modern solution to enable your remote workforce.
9 min read
What is Azure Virtual Desktop?
Topics: Data Security VDI Azure VDI Virtual Desktop Solution Remote Workforce virtual machines Azure Virtual Desktop
8 min read
The 5 Best Ways to Protect ePHI
Healthcare organizations can use these 5 strategies to secure electronic protected health information (ePHI).
Topics: HIPAA Compliance Data Security Encryption ePHI Security Protected Health Information Protect ePHI HIPAA Security Rule What is ePHI
3 min read
15 Lessons Learned from a HIPAA Data Breach
Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening! My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.
Topics: HIPAA Compliance Data Security IT Security cybersecurity ePHI Security HIPAA Risk Analysis
3 min read
Encryption Could Have Prevented Data Breach
Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records
Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach. Encryption is like a Get Out of Jail Free Card! Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record. These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin. The worst part is that it could have been easily prevented with one simple and inexpensive security measure.
Topics: HIPAA Compliance Data Security
2 min read
Should You Allow Employees to Use Their Own Devices for Work?
BYOD offers many benefits, but you have to consider the IT Security Risks
The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice. "Bring Your Own Device” vs. “Corporate Owned Device”.