The Ultimate Guide to Secure Remote Work [Updated for 2020]

The ultimate guide to secure remote work and telework

With the coronavirus in the news, more businesses than ever are considering whether telework is a viable option for their company and employees. But with new cyber threats and data breaches constantly reported, business owners have to ask themselves, How do I maintain my cyber security when my employees work remotely? Whether you have one […]

HIPAA Part 7: Getting Started

It is time to get started on the path to HIPAA compliance

We’ve come to the end of our HIPAA series, and if you’ve been following along, you might feel overwhelmed by the prospect of becoming HIPAA compliant. There’s a lot to do if you’re just starting out. Keep in mind that by creating a culture of compliance, it becomes easier to verify that you’re following the […]

HIPAA Part 6: Plan for the Worst

HIPAA guidelines help you to plan for the worst

No one likes to think they’ll suffer a disaster, a ransomware attack, or a data breach, but hope isn’t enough to satisfy HIPAA. The question is no longer if something will happen, but when. HIPAA expects you to plan, prepare, test, and be ready for anything that could disrupt the confidentiality, integrity, or availability of […]

3 Easy Ways to Make the Most of Your Firewall

Is your firewall effective in keeping things out?

Is the mess of cords and cables in your server room weighing heavy on your mind? Whether or not you rely on a managed services provider (MSP) to keep your IT systems organized and in check, you have a responsibility as a business owner to understand the hardware that keeps everything running. Misinformation about firewalls […]

HIPAA Part 5: The Cycle of Risk

You can stop the cycle of risk!

In part 4 of our HIPAA series, we dug deep into the Security Risk Analysis (SRA) and how to perform one. This time, we’re going to look at what to do with the SRA once it’s completed. The SRA serves as a starting point for fulfilling many of the standards of the Security Rule, but […]

Taking Your Nonprofit to the Cloud!

What is SharePoint and how it can help your business

As a nonprofit, you are frequently responsible for doing more with less. Saving time, money, and effort is essential to maintaining and expanding your reach with limited manpower and funding. One of the most accessible ways to do that is through the technology department. In part one of our series for nonprofit organizations, we discussed […]

4 Strategies for Boosting Your Nonprofit’s Online Presence

Build the social media landscape that reflects your nonprofit

The world of technology and the internet can look very different from a nonprofit organization’s perspective. With a board of directors, budgets, and often limited personnel, properly vetting and implementing new technology can be a daunting task. In the first of our series of blog posts focused on technology and nonprofit organizations, we take a […]

HIPAA Part 4: Risky Business

How do we assess risk in business? HIPAA gives some guidelines.

No matter the size of your practice, compliance with the HIPAA Security Rule is a serious undertaking. In order to fix a problem, you must first know it exists. That’s why the Risk Analysis and Risk Management implementation specifications are the foundation of your security compliance efforts. We touched on risk management in Part 2 […]

HIPAA Part 3: Document! Document! Document!

hipaa documentation

As you read through the Privacy and Security Rules for HIPAA, you’ll see a pattern that shouldn’t be taken for granted. Nearly all the implementation specifications require some form of policy and procedure documentation. This involves more than the reasoning and justification for how you choose to implement the specifications (though that must be documented […]