15 Lessons Learned from a HIPAA Data Breach

Posted by Rose Doherty on Jul 25, 2018 1:14:14 PM

HIPAA-IT-Security-and compliance

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Read More

Topics: HIPAA Compliance, Data Security, IT Security, cybersecurity, ePHI Security, HIPAA Risk Analysis

Video: Prevent a Ransomware Attack

Posted by Rose Doherty on Apr 27, 2016 2:23:34 PM

Learn How to Prevent a Ransomware Attack

Protect Your Network Before a Ransomware Attack 

Learn how to protect your network from a ransomware attack with this video highlighting the critical security practices you need to put in place now.  Peter Ayedun, President of IntelliSuite IT Solutions, presents the key components of a layered security strategy to help keep your network secure.  He'll educate you on the only way to guarantee you will restore your data safely, but you need to put it in place before you are attacked.  

Read More

Topics: Data Security, Internet Security

7 Questions That Will Protect Your Network from Viruses and Ransomware

Posted by Rose Doherty on Apr 22, 2016 1:57:31 PM

Train your employees to ask these 7 questions before clicking an email link. 

The fastest and easiest way for cybercriminals to steal your confidential data or paralyze your network with ransomware is to send an email to your employees and get just one of them to click on a link or open an attachment.  That is all they have to do, and once anyone on the network clicks, they criminal has been invited in to do whatever damage they want.  Employee education is the key to your corporate security.  Teaching them to ask these questions before clicking is one of the most effective security strategies you could implement.

Read More

Topics: Data Security, IT Security

Webinar: How to Prepare for and Respond to a Ransomware Attack

Posted by Rose Doherty on Mar 28, 2016 10:46:07 AM

Recorded Webinar Broadcast

How to Protect Your Network before a Ransomware Attack

With recent attacks on hospital data catching headlines, we believe education is critical to help businesses and medical practices keep their data safe.  We co-present this webinar with our partners at Hospital Portal.net, a software company specializing in intranet and healthcare policy and procedure management systems.  Learn how to protect your network with this critical security information.

Read More

Topics: Data Security, Internet Security

3 Benefits of Online Backup Solutions

Posted by Rose Doherty on Mar 8, 2016 1:34:48 PM

Every Business Needs an Online Backup Solution 

A successful Disaster Recovery Plan or Business Continuity Plan requires that an online data and system backup solution is in place.  What are your options in choosing the best backup solution for your business.  

Read More

Topics: Data Security, Backup

3 Ways to Protect Against Ransomware

Posted by Rose Doherty on Feb 18, 2016 9:27:27 AM

California Hospital Paralyzed by Ransomware, here is how to prevent your business from falling victim.

Ransomware took center stage this week by forcing Hollywood Presbyterian Medical Center in California to declare an internal emergency. Physicians were locked out of the EHR, staff could not access email, and departments were left to communicate by fax machine.   Let's look at three key strategies that can help you prevent ransomware, or minimize the damage if you find yourself a victim.  

Read More

Topics: Data Security

Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records.

Posted by Rose Doherty on Feb 9, 2016 3:27:23 PM

Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach.  Encryption is like a Get Out of Jail Free Card!


Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record.  These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin.  The worst part is that it could have been easily prevented with one simple and inexpensive security measure.

Read More

Topics: HIPAA Compliance, Data Security

IT Security Best Practice for Mobile Device Use

Posted by Rose Doherty on Dec 21, 2015 8:00:00 AM

4 Smart Tips For Mobile Device Use


If you’re planning on heading out of town – or simply to the coffee shop to work – you will want to keep these tips in mind to keep your data secure.

Read More

Topics: Data Security, IT Security

What is Data Encryption?

Posted by Rose Doherty on Dec 7, 2015 8:00:00 AM

Are You Responsible for Sensitive Data?

Here is what you need to know to protect your business from data loss or intrusion.

Read More

Topics: Security, HIPAA Compliance, Data Security, Mobile Device Management

What is PHI?

Posted by Rose Doherty on Nov 23, 2015 8:00:00 AM

18 Identifiers That Define Protected Health Information (PHI)


Protected Health Information (PHI) is defined as information in any format that identifies the individual, including demographic information collected from an individual that can reasonably be used to identify the individual.  PHI is information created or received by a healthcare provider, insurance company, employer, or health care clearinghouse, and relates to the past, present, or future physical or mental health or condition of an individual.  

In order for Covered Entities and Business Associates to protect PHI, it is critical that you are aware of these 18 identifiers that constitute that the information qualifies as PHI. 

Read More

Topics: HIPAA Compliance, Data Security

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all