Maybe you’re HIPAA compliant but still looking for ways to continue to improve your healthcare organization from a technology perspective. Enter the “Technology Survival Guide”. Three easy ways to start improving the way your organization approaches HIPAA compliance and patient information management.
Like many small businesses, you’ve likely started out using a friend or family member, individual contractor, micro-sized IT provider, or depended on your own skills to help setup and support your IT systems.
As you’ve grown, so have your IT needs.
HIPAA. Most people have heard the acronym, you might even know what it stands for, but do you really know what it means for your business?
HIPAA does not just matter for your primary physician.. If you accept health insurance as payment OR if you’re a vendor for a client that accepts health insurance funds AND you have access to electronic patient health records, you must comply with HIPAA regulations.
If you’re like the many small businesses we’ve run into, you struggle with justifying replacing your computers on a routine schedule. It's expensive and it's a headache...we get it, we really do.
Below we’ll go over the Pros and Cons of the two schools of thought.
Cybersecurity Series | Part 3
Email Security: How to Avoid Phishing and Block Scammers
Given the amount of emails sent and received in any given day at a company, it’s important to focus cybersecurity efforts on email security. Emails can be a dangerous loophole for phishing attacks if not managed properly within your business.
Cybersecurity Series | Part 2
Why Passwords Matter
Not all passwords are created equal. And that’s not just because you literally create your own individual password. It’s important to be informed when creating passwords for classified information because passwords really are not created equal when it comes to cybersecurity.
Cybersecurity Series | Part 1
Simple Employee Precautions for Your Small Business
Educating employees about cybersecurity can start small and simple. Small efforts consistently across all employees can significantly strengthen cybersecurity risk for your small business.
Disclaimer: We’re an IT firm. We recommend that you evaluate the data and choose a path that best serves your business’s needs. This advice is intended for business with 10+ employees.
We’ve had prospects and clients ask us if they should buy their computers from retailers such as BestBuy, Dell.
When your computer life has come to an end, proper destruction of your hard drive is vital to the security of your business.
When disposing of an old PC, it’s important to consider the importance of the information still on the hard drive when you determine how (or whom) will be completing the destruction of your drive.
E-waste is a growing problem in the United States and beyond. We’re talking discarded computers, televisions, printers, cell phones, smoke alarms, microwaves, and other miscellaneous electronic equipment. Up until last September, China accepted 70% of the world’s electronic waste- when they stopped doing so, many countries like the United States were faced with the reality of the growing e-waste problem and what to do about it.