An End-of-Year Checklist for Business Technology Planning
Now that the end of the year is coming, it’s time to start your business technology planning for 2020. Here’s a handy end-of-year checklist to[...]

HIPAA Compliance Basics
HIPAA Compliance Basics – IT HIPAA Compliance If you are an organization subject to HIPAA, you need to understand and comply with all relevant requirements.[...]

Protecting Your Business Mac Computer from Cyber Infections: Tips to Know
Tips to Protect Your Mac Computer from Cyber Threats Mac computers have an excellent reputation when it comes to cybersecurity, but they can still be[...]

Happy Thanksgiving
Thanksgiving wouldn’t be complete without sending a thank you to all of the local businesses in our community and a special thank you to those[...]
Have You Properly Secured Your Patient Portal?
Patient portals are a convenient way for patients and healthcare professionals to communicate – but when it comes to technology, convenience often comes with risks.[...]

What Are Your Company’s Responsibilities Following a Data Breach?
Learn from Marriott’s Example: Notification Responsibilities After a Data Breach Most states, the District of Columbia, the Virgin Islands and Puerto Rico have passed legislation[...]

Document Management, Confidentiality Compliance, and HIPAA Adherence
HIPAA is an everyday stressor in the healthcare industry. A computer-based recordkeeping system can help keep records secure and HIPAA compliant. For many in[...]

National Study Shows IT Improves Patient Care In Nursing Homes
A University Of Missouri study has found that investing in IT can have a positive effect on the quality of care in nursing homes.

For those who deserve our utmost respect…
November 11th is Veterans Day… A day where we stand united to honor those who are currently serving and those who have served – those[...]

Stop Hackers Cold: Eliminate These Common Entry Points
Weak Points in Cybersecurity Hackers Love Do you know where hackers are most likely to gain access to your private data? Discover the favorite entry[...]

NIST Releases Guidance Solutions for PACS Ecosystem
Given how medical providers struggle with ensuring their data is safe, something had to be done to offer guidance. Read this blog about a new[...]

Want To Drastically Enhance Your Small Business Cybersecurity?
No matter how secure you may be right now, you could always be doing more. Have you double-checked your cybersecurity lately? Review the best practices[...]