Vulnerability Assessment

Vulnerability Assessment & HIPAA Compliance Scans

Vulnerability Assessment and HIPAA Compliance Scans for Healthcare Vulnerability Assessment and Compliance laws aren’t something new if you’re coming from the financial or retail industry. For example, PCI Compliance was introduced in the late 90’s to help protect your personal and credit card information from criminals. Now, with the advent of the Patient Protection and…

Details
Medical Practice Network Security

A Comprehensive Guide to Medical Practice Network Security

Medical Practice Network Security Guide Medical practice network security is paramount when designing a new medical office network. Now that security hazards are on the rise, practices are faced with many technology challenges. Most notably, they need to protect their networks from internet threats. However, to meet this challenge, practice owners must first understand the…

Details
ePHI security breach

Patient Data Compromised by Third Party Vendors

ePHI Security Breach at Large Healthcare Provider in Arizona In recent media coverage, Banner Health revealed that hackers might have accessed their patient health insurance records. As a result, cyber criminals compromised up to 3.7 million patient records. Unfortunately, this ePHI security breach occurred because hackers obtained access to their servers through a third party food service…

Details
Overbuilt Technology Systems – Urology Practice Case Study

Overbuilt Technology Systems – A Case Study

Lowering Your Healthcare Practice’s IT Spending, lower IT spending medical practice, plus vs. VPN, custom Application, web support & maintenance for Healthcare Practices – New York, New Jersey, Pennsylvania, NY, NJ, PA, NextGen EHR Template development, Electronic Health Records, EHR Administration, IT Managed Services for Healthcare, NextGen, MAARS Automated Appointment Reminder, IT for Healthcare Practices,…

Details
Drive Encryption

Security Risk Analysis & Drive Encryption

Security Risk Analysis & Drive Encryption Lately, there’s been confusion about hard drive encryption requirements for medical practices. So, it’s important to understand the difference between “addressable” and “required” as it pertains to your Security Risk Assessment. Shortly after the dawn of the Affordable Care Act in 2010, “addressable” was a term used to describe a…

Details