Archives
Categories
- Announcements
- Apple
- Applications
- Arctic Wolf Networks
- Azure
- Backup and Disaster Recovery
- Business Continuity
- BYOD
- Cloud Computing
- Compliance
- Coronavirus
- COVID-19
- Cryptocurrency
- Customer Service
- Cybersecurity
- DFARS
- Dynamics NAV Hosting
- Firewall-as-a-Service
- HIPAA
- iOS
- IT Best Practices
- IT Expenses
- IT Outsourcing
- IT Security
- Legal Vertical
- Linux
- Managed IT Services
- Medical, EMR, EHR
- Microsoft Azure
- Microsoft Power Platform
- Mobile
- Mobile Computing
- New Jersey
- New York City (NYC)
- Office 365
- PCI
- Rancho Cucamonga Location
- Rant
- Regulatory Compliance
- SharePoint
- SiteLink
- Small Business
- SOCaaS
- Software Development
- Sort of Technical
- Tools/Utilities
- Troubleshooting
- Ubuntu
- Uncategorized
- Very Technical
- Virtualization
- Windows Surface
- Windows Virtual Desktop (WVD)
- Announcements
- Apple
- Applications
- Arctic Wolf Networks
- Azure
- Backup and Disaster Recovery
- Business Continuity
- BYOD
- Cloud Computing
- Compliance
- Coronavirus
- COVID-19
- Cryptocurrency
- Customer Service
- Cybersecurity
- DFARS
- Dynamics NAV Hosting
- Firewall-as-a-Service
- HIPAA
- iOS
- IT Best Practices
- IT Expenses
- IT Outsourcing
- IT Security
- Legal Vertical
- Linux
- Managed IT Services
- Medical, EMR, EHR
- Microsoft Azure
- Microsoft Power Platform
- Mobile
- Mobile Computing
- New Jersey
- New York City (NYC)
- Office 365
- PCI
- Rancho Cucamonga Location
- Rant
- Regulatory Compliance
- SharePoint
- SiteLink
- Small Business
- SOCaaS
- Software Development
- Sort of Technical
- Tools/Utilities
- Troubleshooting
- Ubuntu
- Uncategorized
- Very Technical
- Virtualization
- Windows Surface
- Windows Virtual Desktop (WVD)









HIPAA
Do I Really Need Disk Encryption as a Covered Entity Under HIPAA?”
Posted on September 28th, 2018 in Compliance, Cybersecurity, HIPAAIn a word, yes. HIPAA section 164.308 requires covered entities to “implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.” Is it reasonable to have employees’ potentially leaving unencrypted laptops in the back seats of taxi cabs with private data on them? Of course not! The scenario of stolen, unencrypted laptops has played out…(read more).
Comments (0)Small Business Cloud Hosting Compliance Questions
Posted on January 24th, 2015 in Cloud Computing, Compliance, HIPAA, IT Security, Medical, EMR, EHR, Small BusinessWhen looking for a small business cloud hosting company in the NJ/NYC area, security and compliance questions are sure to arise. Any understandably so. We put together a list of frequently asked questions here to guide our prospective customers accordingly. The questions and answers refer specifically to our New Jersey data center cloud hosting operations. Is your data center SSAE…(read more).
Comments (0)Is Office 365 HIPAA Compliant?
Posted on November 16th, 2014 in HIPAA, IT Security, Medical, EMR, EHR, Office 365HIPAA and the HITECH Act are U.S. federal laws that apply to most physicians’ offices and healthcare facilities. They set forth the requirements for the safeguarding of identifiable health information, also called Protected Health Information or PHI. HIPAA and the HITECH Act also require these entities to sign agreements (called business associate agreements BAAs) with vendors who provide certain services…(read more).
Comments (0)Why You Need E-Mail Encryption
Posted on September 8th, 2014 in HIPAA, IT Security, Small BusinessYou may have seen a lot of encryption news lately, and you aren’t alone. According to Hoffman & Hoffman Worldwide the level of interest in encryption and the number of encryption-related news articles are at an all-time high. What’s causing all the attention? A few things: Increased Breaches As more breaches occur and news outlets increase their coverage of the…(read more).
Comments (0)Bring Your Own Devices (BYOD) Policies and Practical Considerations
Posted on May 29th, 2014 in BYOD, HIPAA, IT Security, Mobile Computing, Small BusinessAs more and more employees are using their own mobile, electronic devices for work, employers must recognize and address the many issues that arise from this practice. Today employees typically own three separate electronic devices (smart phones, tablets and laptops), which all potentially can be used for work. In the very near future, e-mails and other work-related information may be…(read more).
Comments (0)Vulnerabilities in Your Medical Office Network
Posted on October 18th, 2013 in HIPAA, IT Security, Medical, EMR, EHRBeing proactive and not reactive when it comes to protection of business networks and PHI has not been on the forefront in medical offices. Healthcare professionals are bordering being paralyzed with the overwhelming amount of changes in their organizations that drive resource and financial obligations. This is the key to why it is being put on the back burner. But…(read more).
Comments (0)