3 min read

15 Lessons Learned from a HIPAA Data Breach

By Rose Doherty on 7/25/18 1:14 PM

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Topics: HIPAA Compliance Data Security IT Security cybersecurity ePHI Security HIPAA Risk Analysis
1 min read

Video: Prevent a Ransomware Attack

By Rose Doherty on 4/27/16 2:23 PM

Protect Your Network Before a Ransomware Attack 

Learn how to protect your network from a ransomware attack with this video highlighting the critical security practices you need to put in place now.  Peter Ayedun, President of IntelliSuite IT Solutions, presents the key components of a layered security strategy to help keep your network secure.  He'll educate you on the only way to guarantee you will restore your data safely, but you need to put it in place before you are attacked.  

Topics: Data Security Internet Security
4 min read

7 Questions That Will Protect Your Network from Ransomware

By Rose Doherty on 4/22/16 1:57 PM

The fastest and easiest way for cybercriminals to steal your confidential data or paralyze your network with ransomware is to send an email to your employees and get just one of them to click on a link or open an attachment.  That is all they have to do, and once anyone on the network clicks, they criminal has been invited in to do whatever damage they want.  Employee education is the key to your corporate security.  Teaching them to ask these questions before clicking is one of the most effective security strategies you could implement.

Topics: Data Security IT Security
1 min read

Webinar: How to Prepare for and Respond to a Ransomware Attack

By Rose Doherty on 3/28/16 10:46 AM

Recorded Webinar Broadcast

How to Protect Your Network before a Ransomware Attack

With recent attacks on hospital data catching headlines, we believe education is critical to help businesses and medical practices keep their data safe.  We co-present this webinar with our partners at Hospital Portal.net, a software company specializing in intranet and healthcare policy and procedure management systems.  Learn how to protect your network with this critical security information.

Topics: Data Security Internet Security
2 min read

3 Benefits of Online Backup Solutions

By Rose Doherty on 3/8/16 1:34 PM

A successful Disaster Recovery Plan or Business Continuity Plan requires that an online data and system backup solution is in place.  What are your options in choosing the best backup solution for your business.  

Topics: Data Security Backup
3 min read

Encryption Could Have Prevented Data Breach

By Rose Doherty on 2/9/16 3:27 PM

Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records

Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach.  Encryption is like a Get Out of Jail Free Card!  Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record.  These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin.  The worst part is that it could have been easily prevented with one simple and inexpensive security measure.

Topics: HIPAA Compliance Data Security
2 min read

IT Security Best Practice for Mobile Device Use

By Rose Doherty on 12/21/15 8:00 AM

If you’re planning on heading out of town – or simply to the coffee shop to work – you will want to keep these tips in mind to keep your data secure.

Topics: Data Security IT Security
2 min read

What is PHI?

By Rose Doherty on 11/23/15 8:00 AM

Protected Health Information (PHI) is defined as information in any format that identifies the individual, including demographic information collected from an individual that can reasonably be used to identify the individual.  PHI is information created or received by a healthcare provider, insurance company, employer, or health care clearinghouse, and relates to the past, present, or future physical or mental health or condition of an individual.  

In order for Covered Entities and Business Associates to protect PHI, it is critical that you are aware of these 18 identifiers that constitute that the information qualifies as PHI. 

Topics: HIPAA Compliance Data Security
3 min read

5 Things to do Before a Data Breach

By Rose Doherty on 11/9/15 8:00 AM

The experts predict that it is not "if" businesses will be the victim of a data breach, it's is "when".  In fact, they believe that most businesses already have been victimized.  If the chances are that high, it would be a great idea to start thinking about what you will want to tell your customers when you notify them. Seriously, what will you want to be able to tell them about how you protected their personal information.

Topics: HIPAA Compliance Data Security
3 min read

Cybercriminals Top 3 Tricks to Hack Your Computer Network

By Rose Doherty on 11/4/15 1:04 PM

Cybercriminals are extremely sophisticated, but there are 3 tricks they use with tremendous success that you need to be aware of.  Knowing their sneaky schemes will help prevent your business from becoming a victim.

Topics: Security Data Security IT Security
2 min read

Should You Allow Employees to Use Their Own Devices for Work?

By Rose Doherty on 9/28/15 7:00 AM

BYOD offers many benefits, but you have to consider the IT Security Risks

The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice. "Bring Your Own Device” vs. “Corporate Owned Device”.

Topics: Disaster Recovery Data Security Backup
2 min read

3 Critical Elements for an Effective Disaster Recovery & Business Continuity Plan.

By Rose Doherty on 9/21/15 7:00 AM

There Are 3 Critical Elements You Must Have In Place To Guarantee A Fast, Pain-Free Recovery Of Your Critical IT Systems In The Event Of A Data-Erasing Disaster, Yet Most Businesses Don’t Have Even One!

When it comes to backing up and protecting your company’s critical data, you need to know for certain – without any doubt – that you could recover your files and be back up and running again fast after a natural disaster, power outage, server crash, hacker attack or other data-erasing event. Here are 3 critical elements you must have to guarantee a painless recovery when things go wrong.

Topics: Disaster Recovery Data Security Backup