Bulletproof Office Helping You to Better Enable Your IT

By: Steve | March 19, 2015

Hacker

 Cybercriminals are constantly developing new tactics and business models because it is so profitable! And while all systems are vulnerable, some are more at risk than others. Criminals of all types are lazy and cybercriminals also look for the "easy" way in.  Consequently, those with the weakest security are the most frequent targets. 


Fortunately, there are specific measures you can take to make your organization a less attractive target. These measures will substantially reduce your risk and improve the safeguards that protect your data, including important customer and employee data.

Upgrade Your Firewall

You’re operating a business, and the first thing you need is a firewall that provides commercial-grade protection. Too...

By: Steve | October 27, 2014

paper files

This is the last in a series of three posts I am providing based upon "compliance secrets" presented at the recent HIPAA Security conference by the HHS Office for Civil Rights (OCR) and NIST in Washington DC.


These views are strictly my own based upon information gathered at the conference.

New Standard for Data Breach Impact

By: Steve | October 15, 2014

medical jargon

This is the second in a series of three posts I am providing based upon "compliance secrets" presented at the recent HIPAA Security Conference by the HHS Office for Civil Rights (OCR) and NIST in Washington DC.


These views are strictly my own based upon information gathered at the conference.

You Must Have a Compliance Program and a Culture of Compliance


As conference leaders made very clear, HIPAA Compliance has two parts.  One is a comprehensive compliance plan, with documentation that confirms your adherence to HIPAA regulations.  The second is a “Culture of Compliance” that you create every day in your practice, medical center or hospital.  Think of one as the letter of the law, and the second as the spirit of the law....