Questions? Talk to a Real Person via our Live Chat
How We Envision Multi-Cloud
By Gil Vidals, , HIPAA Blog

How We Envision Multi-Cloud

The clouds are gathering, so to speak. Multi-cloud technology is no longer on the horizon – it’s here. Traditionally, healthcare organizations have been slow to embrace the benefits of the cloud, rightfully focusing on the need for essential data security. An MSSP like HIPAA Vault helps alleviate those concerns, by providing a 24/7, managed cloud... Continue reading
Why your forms must be HIPAA Compliant
By Gil Vidals, , HIPAA Blog

Why your forms must be HIPAA Compliant

Anyone who handles medical information has probably heard the horror stories about what happens when protected health data falls into the wrong hands. There is, for instance, the $16 million settlement that health insurance giant Anthem is paying in response to the largest U.S. health data breach in history. In that case, hackers sent spear-phishing... Continue reading
Are Windows Server Platforms HIPAA Compliant?
By Gil Vidals, , HIPAA Blog, Resources

Are Windows Server Platforms HIPAA Compliant?

Mission-critical servers are valued for their longevity, and Windows is no exception. As a closed-source technology, Windows Server platforms typically have a long life-cycle, in part, because the training and manuals for the tools are proprietary, just like the software. But similar to the Windows desktop distributions (XP, Vista, 7, 8,8.1, & 10), the Windows... Continue reading
Charity and Security Begin at Home
By Gil Vidals, , HIPAA Blog

Charity and Security Begin at Home

It’s a debated idea in our national discourse lately, and believe it or not, there’s a parallel to cybersecurity. The charity debate (as we’ll call it) comes as a question of priorities; should we only look after ourselves and our own, and let it end there? With no political agenda here, we can say that If one truly understands charity... Continue reading
Why Establish a Security Culture
By Gil Vidals, , HIPAA Blog

Why Establish a Security Culture

Five “Security Culture” Markers to Aim for in your Organization: Cybersecurity is a top-down, strategic part of the company’s vision –Security is linked to business goals and relevant to board-level decisions You’ve determined a “data blueprint” of how data is used –Your team understands the context in which the data is created and used, and... Continue reading
Skip to content