Blog

Blog > Page 31

Blog

Options for enterprise data storage

Local data center, hybrid cloud or cloud? As an enterprise IT manager, you have an unprecedented amount of choice for your storage needs, but finding the best solution still requires a good deal of research. Enterprise storage has been all the rage over the past few years as companies cope [...]

Read More

HIPAA Security Reminder of the Week

Identify the Risk Groups and Safeguard PHI Sensitive information, such as PHI and PII, is a critical asset within a health care organization. Identifying the risk groups helps clarify operational context and reveals potential vulnerabilities across the IT infrastructure. By doing this, we establish clear priorities for making security investments [...]

Read More

HIPAA Security Reminder of the Week

HIPAA Alphabet Soup The Acts that made all this privacy and security possible: HIPAA: Health Insurance Portability and Accountability Act HITECH Act: Health Information Technology for Economic and Clinical Health Act ARRA Act: American Recovery and Reinvestment Act Key acronyms: BA: Business Associate CE: Covered Entity EHR: Electronic Health Record, [...]

Read More

Backup and DR: Keep your business safe

It’s essential to have the right IT backup and disaster recovery (DR) systems in place if you want to safeguard your company’s digital assets. From cyberattacks and malware to hardware failures and natural catastrophes, having the right plan in place is essential. It can test your system, prevent loss and [...]

Read More

HIPAA Security Reminder of the Week

Unique User Identification – Logon ID The HIPAA Security Rule requires Covered Entities and Business Associates to implement a “Unique User Identification” for systems holding Electronic Protected Health Information (ePHI). It is a “required” implementation specification under the Access Control Standard and should be employed for all information assets that [...]

Read More

The best games for kids to play at school

The value of game-play as an educational technique is now well established. More and more games and platforms are being released each year that help students learn valuable skills while they play; so, which subjects benefit most from this technique and what skills do they teach? With educational benchmarks and [...]

Read More

HIPAA Security Reminder of the Week

Potential HIPAA Security Violations When an unencrypted device containing ePHI is stolen or missing, this could result in a HIPAA security violation. For example: A thumb drive containing the Electronic Protected Health Information (ePHI) of approximately 2,200 individuals was stolen from a vehicle. The entity needed to conduct an accurate [...]

Read More
Call Now Button