Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

Why HIPPA Compliant Hosting Providers Should Hire a CISSP

Regulatory Compliance | Risk Assessment | Information Assurance | Password Management When providing services to HIPAA clients, guidelines have to be followed and rules put into place; this requires someone that can manage these restrictive measures and become intimately familiar with the processes involved. Professionals who have obtained the CISSP credentials possess this knowledge, with... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Vulnerability Scans Should be Required for HIPAA Hosting

Malicious actors want your data, and will actively scan networks in order to discover vulnerabilities. Once they know your network’s weaknesses, they attempt to penetrate the network and gain unauthorized access in order to abuse the system in some way. Abuse may include stealing your data or using the compromised system as part of their... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Differences Between PCI DSS Compliance & HIPAA Compliance

HIPAA and PCI DSS are both frameworks for complying with legal guidelines that ensure the underlying data is protected appropriately. So what are the differences? Whereas HIPAA is focused on protecting Protected Health Information (PHI) or Electronic Health Records (EHR), PCI-DSS is centered around an individual’s credit card data. HIPAA is the Health Insurance Portability... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Protected Health Information – What, When, Where, Why

Protected Health Information must be encrypted according to HIPAA $164.312 Technical safeguards. At first glance this seems obvious even to a casual observer. PHI data must be encrypted because it contains the private health records of a patient, and this private information must be carefully safeguarded. It’s easy to understand that the confidential data must... Continue reading
Skip to content