New ebook Available: Get Hip to HIPAA: A Beginner’s Guide to HIPAA Compliance

HIPAA ebook is available

Struggling to understand the basics to HIPAA compliance? Want to keep your customers’ private data safe? Download Anderson Technologies’ Get Hip to HIPAA: A Beginner’s Guide to HIPAA Compliance for an overview of the important aspects of HIPAA, including the Security Rule, Risk Assessments, and the many resources available to help bring you into compliance. […]

The Ultimate Guide to Secure Remote Work [Updated for 2020]

The ultimate guide to secure remote work and telework

With the coronavirus in the news, more businesses than ever are considering whether telework is a viable option for their company and employees. But with new cyber threats and data breaches constantly reported, business owners have to ask themselves, How do I maintain my cyber security when my employees work remotely? Whether you have one […]

HIPAA Part 7: Getting Started

It is time to get started on the path to HIPAA compliance

We’ve come to the end of our HIPAA series, and if you’ve been following along, you might feel overwhelmed by the prospect of becoming HIPAA compliant. There’s a lot to do if you’re just starting out. Keep in mind that by creating a culture of compliance, it becomes easier to verify that you’re following the […]

HIPAA Part 6: Plan for the Worst

HIPAA guidelines help you to plan for the worst

No one likes to think they’ll suffer a disaster, a ransomware attack, or a data breach, but hope isn’t enough to satisfy HIPAA. The question is no longer if something will happen, but when. HIPAA expects you to plan, prepare, test, and be ready for anything that could disrupt the confidentiality, integrity, or availability of […]

3 Easy Ways to Make the Most of Your Firewall

Is your firewall effective in keeping things out?

Is the mess of cords and cables in your server room weighing heavy on your mind? Whether or not you rely on a managed services provider (MSP) to keep your IT systems organized and in check, you have a responsibility as a business owner to understand the hardware that keeps everything running. Misinformation about firewalls […]

HIPAA Part 5: The Cycle of Risk

You can stop the cycle of risk!

In part 4 of our HIPAA series, we dug deep into the Security Risk Analysis (SRA) and how to perform one. This time, we’re going to look at what to do with the SRA once it’s completed. The SRA serves as a starting point for fulfilling many of the standards of the Security Rule, but […]