Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

The HIPAA Security Rule was enacted in 1996, designed to establish national standards to protect individuals’ electronic personal health information (PHI) used and/or stored by a covered entity. Many healthcare organizations have complex technology environments, thus making it difficult for healthcare providers and business associates to comply with the HIPAA Security Rule policies and procedures....

avatar
Duleep Pillai
February 12, 2014
Discover More
Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

The Top 4 Benefits of Upgrading From Windows XP to Windows 7

Many organizations plan to continue running Windows XP after April 8th, 2014. If you’ve neglected to begin the migration process, it’s important to consider the security threats involved with running an unsupported and unpatched operating system. Most cybercriminals are hoarding Windows XP exploits until April, when Windows XP systems will become vulnerable to malware and...

avatar
Duleep Pillai
February 11, 2014
Discover More
Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

ATM Operators Must Migrate Away from Windows XP As Soon As Possible

Automated teller machines, commonly known as ATMs, are essentially computers. While they’re not traditional PCs, there’s a user interface, a screen, a processor, various hardware, and an operating system. Did you know most financial institutions are running Windows XP on their ATMs? This is a recipe for disaster when it comes to the end of...

avatar
Duleep Pillai
February 10, 2014
Discover More
Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

Developing an Enterprise Cloud Strategy? Here’s What You Need to Know

Cloud computing is becoming a popular trend for businesses looking to increase agility and lower costs. There are three categories of cloud computing: Software as a Service (SaaS) Software as a Service is a software distribution model in which applications are hosted and managed by the service provider and end users access the applications over...

avatar
Duleep Pillai
February 7, 2014
Discover More
Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

Is Apple FaceTime HIPAA Compliant?

Apple’s FaceTime video calling feature was one of the most popular features on the iPad 2. In July 2010, rumors claimed FaceTime calls weren’t encrypted, however, Apple dismissed those rumors and told the public that the entire FaceTime conversation stream is encrypted. Apple’s FaceTime could have a lot of potential in the healthcare industry. Healthcare...

avatar
Duleep Pillai
February 6, 2014
Discover More