Some exciting new approaches in the world of infrastructure and server management have taken place in recent years. The advent of cloud computing and virtualization is fast transforming a process that once took days and even weeks to employ: hardware configuration and employment of new applications. Infrastructure as Code (IaC), or “programmable infrastructure” as some... Continue reading
When it comes to businesses in the healthcare sector, the question is often asked: “Do I need to be HIPAA Compliant or Not?” The short answer is that if your application or business handles PHI (protected health information) electronically, the answer is, “Most likely, yes.” Those that use an EMR (electronic medical record) system and... Continue reading
Why do I need to change my password? How often should my password be changed? When does my password expire? What about service accounts? These are common questions asked by customers, especially those who may be weary of password policies within their hosted environment. It’s important to know that HIPAA regulations require that procedures exist... Continue reading
What privacy rights do you have with your own personal health information? This a common question with a not-so-simple answer. Any health-related information that could potentially identify an individual (and which there is a reasonable basis to believe so) is considered private health information. A number of things are important in relation to health information;... Continue reading
The state of California is no different than other states when it comes to existing loopholes in federal laws and regulations. These loopholes continue to allow for breaches of patient health information (PHI). Common ways that patient information has been leaked are from the Explanation of Benefits letters and communications from Health Insurance plans. Each state... Continue reading
The HIPAA privacy and security rules require certain steps be taken during the destruction or removal of PHI (protected health information). These portions of the act mandate "reasonable safeguards to limit incidental, and avoid prohibited, uses and disclosures of PHI." What this means is that if HIPAA data is left in a trash can or an old hard drive that is replaced and discarded, HIPAA is violated.
Download HIPAA Checklist
HIPAA Insider Newsletter
Your WordPress site is protected through multiple automated snapshot policies — including daily and multi-regional backups. Each snapshot is encrypted, verified for integrity, and securely stored across HIPAA-compliant data centers to ensure continuous protection and rapid recovery.
Get Your HIPAA Compliant WordPress Hosting Today!
For just $120/mo (first month free!), never lose sleep over data breaches or $10,000s in fines again.