Questions? Talk to a Real Person via our Live Chat
What’s all the Hype about Kubernetes?
By Gil Vidals, , HIPAA Blog, Resources

What’s all the Hype about Kubernetes?

What is Kubernetes, or K8s? Kubernetes, or “K8s” as it’s popularly known, comes from a Greek word meaning “pilot,” or “helmsman.” Based on the original, internal Google code used to run their search ads and apps (and geekily named after the Star Trek: Voyager Borg drone known as ‘Seven of Nine’), it purports to warp... Continue reading
Phishing in the Wrong Pond
By Gil Vidals, , HIPAA Blog, Resources

Phishing in the Wrong Pond

Have you heard the one about the company that decided to plan a “Phishing trip” for their employees? Back in 2016, Atlantic Health System circulated a juicy email, promising employees a raise if they would simply respond with some key verification information. The information included employee id, date of birth, and home zip code. Roughly... Continue reading
Is Gmail HIPAA Compliant?
By Gil Vidals, , HIPAA Blog

Is Gmail HIPAA Compliant?

Still one of the most popular online searches in regard to HIPAA, the answer is clear: as a standalone service, Gmail by itself is not HIPAA compliant, but it can be.  Even though Google employs some of the best security measures available, sending electronically protected health information (ePHI) using a regular Gmail account is explicitly prohibited... Continue reading
Physical Safeguards for HIPAA, Part 2: Workstation Use
By Gil Vidals, , HIPAA Blog

Physical Safeguards for HIPAA, Part 2: Workstation Use

In part 1 of this series, we learned that a laptop containing sensitive, protected health information (PHI) was stolen from the car of a West Virginia Health System employee. To make matters worse, the hard drive containing PHI was unencrypted, leaving the data open to access by unauthorized users. While unfortunate, the occurrence does serve to highlight... Continue reading
Skip to content