Let's Connect
  • Sales Chat
  • Remote Session
  • 877-394-4368 877-394-4368
  • Login
  • IT Consulting
  • Software Development
  • Cloud
  • About
  • Contact
  • Support
Menu
  • IT Consulting
  • Software Development
  • Cloud
  • About
  • Contact
  • Support
Search
Login

Archives

View Archives
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Categories

Categories
  • Announcements
  • Apple
  • Applications
  • Arctic Wolf Networks
  • Azure
  • Backup and Disaster Recovery
  • Business Continuity
  • BYOD
  • Cloud Computing
  • Compliance
  • Coronavirus
  • COVID-19
  • Cryptocurrency
  • Customer Service
  • Cybersecurity
  • DFARS
  • Dynamics NAV Hosting
  • Firewall-as-a-Service
  • HIPAA
  • iOS
  • IT Best Practices
  • IT Expenses
  • IT Outsourcing
  • IT Security
  • Legal Vertical
  • Linux
  • Managed IT Services
  • Medical, EMR, EHR
  • Microsoft Azure
    • Powershell
  • Microsoft Power Platform
  • Mobile
  • Mobile Computing
  • New Jersey
  • New York City (NYC)
  • Office 365
  • PCI
  • Rancho Cucamonga Location
  • Rant
  • Regulatory Compliance
  • SharePoint
  • SiteLink
  • Small Business
  • SOCaaS
  • Software Development
  • Sort of Technical
  • Tools/Utilities
  • Troubleshooting
  • Ubuntu
  • Uncategorized
  • Very Technical
  • Virtualization
  • Windows Surface
  • Windows Virtual Desktop (WVD)
  • Announcements
  • Apple
  • Applications
  • Arctic Wolf Networks
  • Azure
  • Backup and Disaster Recovery
  • Business Continuity
  • BYOD
  • Cloud Computing
  • Compliance
  • Coronavirus
  • COVID-19
  • Cryptocurrency
  • Customer Service
  • Cybersecurity
  • DFARS
  • Dynamics NAV Hosting
  • Firewall-as-a-Service
  • HIPAA
  • iOS
  • IT Best Practices
  • IT Expenses
  • IT Outsourcing
  • IT Security
  • Legal Vertical
  • Linux
  • Managed IT Services
  • Medical, EMR, EHR
  • Microsoft Azure
    • Powershell
  • Microsoft Power Platform
  • Mobile
  • Mobile Computing
  • New Jersey
  • New York City (NYC)
  • Office 365
  • PCI
  • Rancho Cucamonga Location
  • Rant
  • Regulatory Compliance
  • SharePoint
  • SiteLink
  • Small Business
  • SOCaaS
  • Software Development
  • Sort of Technical
  • Tools/Utilities
  • Troubleshooting
  • Ubuntu
  • Uncategorized
  • Very Technical
  • Virtualization
  • Windows Surface
  • Windows Virtual Desktop (WVD)

Microsoft
Cisco
HP
Lenovo
StorageCraft
VMware
Extreme Networks
Dell PartnerDirect
SonicWall
Home Blog HIPAA

HIPAA



Do I Really Need Disk Encryption as a Covered Entity Under HIPAA?”

Posted on September 28th, 2018 in Compliance, Cybersecurity, HIPAA

In a word, yes.  HIPAA section 164.308 requires covered entities to “implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.” Is it reasonable to have employees’ potentially leaving unencrypted laptops in the back seats of taxi cabs with private data on them?  Of course not!  The scenario of stolen, unencrypted laptops has played out…(read more).

Comments (0)

Small Business Cloud Hosting Compliance Questions

Posted on January 24th, 2015 in Cloud Computing, Compliance, HIPAA, IT Security, Medical, EMR, EHR, Small Business

When looking for a small business cloud hosting company in the NJ/NYC area, security and compliance questions are sure to arise.  Any understandably so.  We put together a list of frequently asked questions here to guide our prospective customers accordingly.  The questions and answers refer specifically to our New Jersey data center cloud hosting operations. Is your data center SSAE…(read more).

Comments (0)

Is Office 365 HIPAA Compliant?

Posted on November 16th, 2014 in HIPAA, IT Security, Medical, EMR, EHR, Office 365

HIPAA and the HITECH Act are U.S. federal laws that apply to most physicians’ offices and healthcare facilities.  They set forth the requirements for the safeguarding of identifiable health information, also called Protected Health Information or PHI. HIPAA and the HITECH Act also require these entities to sign agreements (called business associate agreements BAAs) with vendors who provide certain services…(read more).

Comments (0)

Why You Need E-Mail Encryption

Posted on September 8th, 2014 in HIPAA, IT Security, Small Business

You may have seen a lot of encryption news lately, and you aren’t alone. According to Hoffman & Hoffman Worldwide the level of interest in encryption and the number of encryption-related news articles are at an all-time high. What’s causing all the attention? A few things: Increased Breaches As more breaches occur and news outlets increase their coverage of the…(read more).

Comments (0)

Bring Your Own Devices (BYOD) Policies and Practical Considerations

Posted on May 29th, 2014 in BYOD, HIPAA, IT Security, Mobile Computing, Small Business

As more and more employees are using their own mobile, electronic devices for work, employers must recognize and address the many issues that arise from this practice. Today employees typically own three separate electronic devices (smart phones, tablets and laptops), which all potentially can be used for work. In the very near future, e-mails and other work-related information may be…(read more).

Comments (0)

Vulnerabilities in Your Medical Office Network

Posted on October 18th, 2013 in HIPAA, IT Security, Medical, EMR, EHR

Being proactive and not reactive when it comes to protection of business networks and PHI has not been on the forefront in medical offices.  Healthcare professionals are bordering being paralyzed with the overwhelming amount of changes in their organizations that drive resource and financial obligations.  This is the key to why it is being put on the back burner.  But…(read more).

Comments (0)
Our Core Values:
  • We are always 100% committed to our customers' needs.
  • We value charity and goodwill.
  • We realize there are no shortcuts to true excellence.
  • We believe in the power of teamwork and collaboration.
  • We honor the golden rule.
  • We are humble.
  • We value transparency.
  • We are honest and value integrity.
  • We lead by example.
  • We value continuous education.
  • We value innovation and forward-thinking.
  • We foster a passion for life, work and everything in between.
  • We discourage negativity.

More About Us

Exigent Technologies LLC is a full-service information technology consulting firm that implements and maintains high-performance IT systems for small and medium-sized organizations in a wide range of industries. Regardless of their size, today’s companies rely on anytime, anywhere access to information—and Exigent delivers.
read more

Want To Find Out More?









    • IT Support & Consulting Services
    • Software Development
    • Cloud
    • About
    • Contact
    • Client Support
    • Areas Served
    • Make a Payment

    Sign Up For Updates

    IT Services, IT Consultants and Cloud Computing | New Jersey | New York City
    55 Madison Avenue, STE 400, Morristown, NJ 07960 | 845 3rd Ave FL 6, New York, NY 10022

    Copyright 2021. Exigent. All rights reserved. Sitemap Privacy Policy|WordPress Website Produced by: Inverse Paradox

    Facebook Twitter LinkedIn YouTube Glassdoor Instagram