Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

Securing PHI with HIPAA Compliant Email Solutions

As smartphones and the internet increasingly impact the way we communicate, the demand for sharing sensitive, electronic-protected health information (e-PHI) through email and instant messaging continues to grow. While these innovations are clearly attractive to many healthcare providers (and their patients), shouldering the underlying burden of IT concerns to support them is not. Issues of... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

WordPress Websites Infected with Keylogger

On January 29, 2018, the widely used website content management system (CMS), WordPress, was once again infected with malware. To date, approximately 2000+ websites running the open-source CMS have become victims of a cryptocurrency keylogger. Coinhive is a JavaScript Monero Blockchain miner service that mines digital cryptocurrency. Coinhive runs a snippet of JavaScript code in... Continue reading
By Gil Vidals, , HIPAA Blog

Facebook’s New VPN

When Israeli-based Onavo came under the ownership of Facebook in 2013, the move was touted as providing a boost to CEO Mark Zuckerberg’s Internet.org initiative to “help bring web access to the world’s underserved communities.” The mobile analytics company would essentially provide Facebook users with a VPN, or Virtual Private Network, a secure connection to... Continue reading
By Gil Vidals, , HIPAA Blog

How to Tell if You Were Sent a Phishing Email

Millions of people wake up every morning, turn off their alarms, and immediately check social media, emails, or any application on their mobile devices. This has grown to be a regular routine for many. A growing number of hackers are taking advantage of these multitudes – most of whom are still half asleep – by... Continue reading
Managed Security Services – Can you afford NOT to have them?
By Gil Vidals, , HIPAA Blog, Resources, Security

Managed Security Services – Can you afford NOT to have them?

Network uptime – your patients depend on it. As cloud-based technology increasingly becomes the preferred means by which companies conduct business, not having the right services in place to protect against unexpected downtimes – whether from hardware/software failures or security compromises – can spell disaster. As the recent Amazon S3 outage proves, catastrophic infrastructure failures... Continue reading
By Gil Vidals, , HIPAA Blog

Malware Threatening Healthcare Organizations

  Clear Procedures are Needed to Protect against Malicious software. That’s a start. Here’s what you also need: Trained users of (the latest) malicious software protection tools, who’ve become skilled in the discovery and reporting of such detections. Limited access to ePHI through controls, allowing only the persons or software programs that require access, and... Continue reading
Skip to content