IT Solutions Blog

15 Lessons Learned from a HIPAA Data Breach

Posted by Rose Doherty on Jul 25, 2018 1:14:14 PM

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Read More

Topics: HIPAA Compliance, HIPAA Risk Analysis, IT Security, cybersecurity, Data Security, ePHI Security

8 Tips from the OCR to Prevent a Phishing Attack

Posted by Rose Doherty on Mar 14, 2018 1:23:17 PM

February 2018 OCR Cybersecurity Newsletter - Phishing

Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and  The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.  

Read More

Topics: cybersecurity, prevent a phishing attack, IT Security, cybersecurity strategies, cybersecurity tips

7 Questions That Will Protect Your Network from Viruses and Ransomware

Posted by Rose Doherty on Apr 22, 2016 1:57:31 PM

Train your employees to ask these 7 questions before clicking an email link. 

The fastest and easiest way for cybercriminals to steal your confidential data or paralyze your network with ransomware is to send an email to your employees and get just one of them to click on a link or open an attachment.  That is all they have to do, and once anyone on the network clicks, they criminal has been invited in to do whatever damage they want.  Employee education is the key to your corporate security.  Teaching them to ask these questions before clicking is one of the most effective security strategies you could implement.

Read More

Topics: Data Security, IT Security

IT Security Best Practice for Mobile Device Use

Posted by Rose Doherty on Dec 21, 2015 8:00:00 AM

4 Smart Tips For Mobile Device Use


If you’re planning on heading out of town – or simply to the coffee shop to work – you will want to keep these tips in mind to keep your data secure.

Read More

Topics: Data Security, IT Security

Cyber-Security Requires Training Employees

Posted by Rose Doherty on Dec 14, 2015 8:00:00 AM

Train your employees  is key to an effective Business Cyber-Security Plan.

Hackers are getting more sophisticated every day, and the ways they lure you to give them access to your computer are downright devious.  It is important that all employees are aware of these simple rules that will help prevent intruders from accessing your computer network.  

Read More

Topics: Security, HIPAA Compliance, Internet Security, IT Security

Cybercriminals Top 3 Tricks to Hack Your Computer Network

Posted by Rose Doherty on Nov 4, 2015 1:04:53 PM


3 Tricks Cybercriminals Use to Attack Your Computer Network

Cybercriminals are extremely sophisticated, but there are 3 tricks they use with tremendous success that you need to be aware of.  Knowing their sneaky schemes will help prevent your business from becoming a victim.

Read More

Topics: Security, Data Security, IT Security

Data Security Best Practices to Avoid the latest Scam.  

Posted by Rose Doherty on Sep 23, 2015 1:22:40 PM

 How to Avoid the newest Tech Support Scam

Cyber criminals have been preying on consumer fears for many years, peddling fake security software, offering free "security" scans, and sending alarming pop up messages telling you that your computer is infected.  Then they try to sell you, or have you download their "security" software, which turns out to be malware that gives the criminal access to your computer and personal information.

The latest version of the scam begins with a scammer calling  you on the phone.

Read More

Topics: Security, Data Security, IT Security