Blog

Blog > Page 2
News Posts

Latest Blog Updates

Preparing for the new analytical doctor

A new generation of doctors and medical students is changing the way data informs: The doctors’ interpretations of the information they have The treatment plans…

HIPAA TIPS: Mobile Device Compliance Part 3

Install and activate remote wiping and/or remote disabling What is remote wiping? Remote wiping is a security feature that enables you to remotely erase the…

HIPAA Security Reminder of the Week

Clean Desk Policy Keep the minimum amount of paper PHI on your desk – only the documents you are working on at the moment. Why?…

How the cloud is transforming education

School IT departments have generally been on the front foot when it comes to embracing new technologies, and teachers who also embrace the latest technologies…

HIPAA TIPS: Implementing a Security Management Process…

Manage and Mitigate Risks Implement Your Action Plan Your action plan should address all five HIPAA security components. Follow your action plan and support ongoing…

HIPAA Security Reminder of the Week

Information Systems are a Privilege Your access to information “assets” such as hardware, software, storage media, etc. is a privilege. Use of company-owned software and…

Cloud or dedicated server? Where is the…

Should you be entrusting your data to the cloud or keeping it down to earth on your own servers? This is a decision facing every…

HIPAA TIPS: Mobile Device Compliance Part 4

Disable and do not install or use file sharing applications What is file sharing? File sharing is software or a system that allows individual users…

HIPAA Security Reminder of the Week

Information Security Reminder Spring is upon us. And while most of us look forward to enjoying the time, scammers and hackers are hard at work trying…

SaaS or on-premises? The security challenge for…

The healthcare industry faces a difficult paradox when it comes to IT services. Healthcare has some of the most tightly governed restrictions on how information…

HIPAA TIPS: Implementing a Security Management Process…

Attest for Meaningful Use Security-Related Objective You can register for the Meaningful Use Programs anytime, but to attest, you must meet the Meaningful Use requirements…

Security Alert: Beware Microsoft Word Attachment Zero-Day…

We have been made aware of a zero-day attack that is infecting users of the Microsoft Office suite of applications (Word, Excel, Outlook, etc.) with…

HIPAA Security Reminder of the Week

Secure Paper Protected Health Information (PHI) too! Sensitive information on paper is the same as sensitive information on a computer. Both need to be protected…

Simplifying security with cloud-based management

Mobile devices improve patient care but broaden the target for hackers. They can also be stolen and lost. Plenty of examples of all three breach…

UPDATE: Security Alert: Beware Microsoft Word Attachment…

We have received an update regarding a recent article posted to our site: (Link to previous article: https://at.obzservices.com/security-alert-beware-microsoft-word-attachment-zero-day-exploit/) Microsoft has released updates to patch the zero-day…

HIPAA TIPS: Mobile Device Compliance Part 5

Install and enable a firewall What is a firewall? A personal firewall can protect against unauthorized connections by intercepting incoming and outgoing connection attempts and…

Laptops or tablets in the classroom?

The trend to bring your own device (BYOD) means schools are handing more control over to parents when it comes to buying technology. Parents and…

Does your business need a dedicated server?

Are you feeling constrained running your business from your desktop or laptop? Chances are if you have more than a couple of users, the time…

Phishing Attack Results in $400,000 HIPAA Breach…

A Denver, Colo.-area network of public health clinics paid a $400,000 HIPAA breach penalty after a phishing attack let a hacker gain access to employee…

HIPAA Security Reminder of the Week

Protect Yourself from Data Security Breaches By monitoring your accounts regularly, you can respond quickly if hackers attempt to use your information.   Security Tips:…

Obfuscation makes the cloud work for healthcare

Patient data is sacred when it comes to healthcare. HIPPA tells us so. In virtually every medical practice, cost controls are also sacred, and there…

HIPAA Security Reminder of the Week

HHS Guidance on Sharing Mental Health Information of a patient The HHS Office for Civil Rights published guidance that addresses some of the more frequently…

Checklist for a successful 1:1 rollout

One-to-one rollouts are game-changing projects. With proper planning, they can be less daunting. Nail this checklist, and the hard work is half done. 1. Establish…

HIPAA TIPS: Mobile Device Compliance Part 6

Install and enable security software What is security software? Security software protects against malicious software such as viruses, spam and malware. A virus is a…

Malvern PA: Stolen Laptop Leads to $2.5…

The theft of a laptop computer containing information of nearly 1,400 patients was among two HIPAA breaches that led a Pennsylvania provider of remote heart…

HIPAA Security Reminder of the Week

Sanction Policy Both the HIPAA Security Rule and the HIPAA Privacy Rule require Covered Entities and Business Associates to document the disciplinary policy and apply sanctions against…

VDI can work for SMB

Since the 1990s, some companies have moved the operating system for workstations from the workstation itself to a server providing operating system images for many…

Security Alert! Google Docs phishing scam

Issue was reported Wednesday (05/03). The scam is one of the oldest around, sending an e-mail asking you to click a hyperlink. Do so, and…

Does your school or business need a…

Has the time come for your school to upgrade its IT infrastructure and capability? It's imperative you have a system that has the capacity to…

HIPAA Security Reminder of the Week

Breach of PHI Assessment 4-Factor Requirement Do you think there’s been a breach of PHI?   Follow these guidelines to determine if PHI has been…