Competing in today's economy requires employees to have access to their tools whether they are working from home or from the office. Azure VDI is the modern solution to enable your remote workforce.
9 min read
8 min read
Healthcare organizations can use these 5 strategies to secure electronic protected health information (ePHI).
3 min read
Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening! My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.
3 min read
Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records
Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach. Encryption is like a Get Out of Jail Free Card! Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record. These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin. The worst part is that it could have been easily prevented with one simple and inexpensive security measure.
Topics: HIPAA Compliance Data Security
2 min read
BYOD offers many benefits, but you have to consider the IT Security Risks
The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice. "Bring Your Own Device” vs. “Corporate Owned Device”.