The Ultimate Guide to Secure Remote Work [Updated for 2020]
With the coronavirus in the news, more businesses than ever are considering whether telework is a viable option for their company and employees. But with new cyber threats and data breaches constantly reported, business owners have to ask themselves, How do I maintain my cyber security when my employees work remotely? Whether you have one […]
5 Fraud Trends and How to Beat Them: Top Tips to Implement for Cyber Security Awareness Month
Every October, Cyber Security Awareness Month is a time to learn, assess, and make changes to protect yourself and your business from the latest, most sophisticated dangers. Beyond damages to reputation and production, monetary costs from cyber crime add up in the billions of dollars. Stay safe and aware this October. Here are five fraud […]
HIPAA Part 7: Getting Started
We’ve come to the end of our HIPAA series, and if you’ve been following along, you might feel overwhelmed by the prospect of becoming HIPAA compliant. There’s a lot to do if you’re just starting out. Keep in mind that by creating a culture of compliance, it becomes easier to verify that you’re following the […]
HIPAA Part 6: Plan for the Worst
No one likes to think they’ll suffer a disaster, a ransomware attack, or a data breach, but hope isn’t enough to satisfy HIPAA. The question is no longer if something will happen, but when. HIPAA expects you to plan, prepare, test, and be ready for anything that could disrupt the confidentiality, integrity, or availability of […]
3 Easy Ways to Make the Most of Your Firewall
Is the mess of cords and cables in your server room weighing heavy on your mind? Whether or not you rely on a managed services provider (MSP) to keep your IT systems organized and in check, you have a responsibility as a business owner to understand the hardware that keeps everything running. Misinformation about firewalls […]
HIPAA Part 5: The Cycle of Risk
In part 4 of our HIPAA series, we dug deep into the Security Risk Analysis (SRA) and how to perform one. This time, we’re going to look at what to do with the SRA once it’s completed. The SRA serves as a starting point for fulfilling many of the standards of the Security Rule, but […]
Taking Your Nonprofit to the Cloud!
As a nonprofit, you are frequently responsible for doing more with less. Saving time, money, and effort is essential to maintaining and expanding your reach with limited manpower and funding. One of the most accessible ways to do that is through the technology department. In part one of our series for nonprofit organizations, we discussed […]
4 Strategies for Boosting Your Nonprofit’s Online Presence
The world of technology and the internet can look very different from a nonprofit organization’s perspective. With a board of directors, budgets, and often limited personnel, properly vetting and implementing new technology can be a daunting task. In the first of our series of blog posts focused on technology and nonprofit organizations, we take a […]
HIPAA Part 4: Risky Business
No matter the size of your practice, compliance with the HIPAA Security Rule is a serious undertaking. In order to fix a problem, you must first know it exists. That’s why the Risk Analysis and Risk Management implementation specifications are the foundation of your security compliance efforts. We touched on risk management in Part 2 […]
HIPAA Part 3: Document! Document! Document!
As you read through the Privacy and Security Rules for HIPAA, you’ll see a pattern that shouldn’t be taken for granted. Nearly all the implementation specifications require some form of policy and procedure documentation. This involves more than the reasoning and justification for how you choose to implement the specifications (though that must be documented […]