WHOO HOO!! I’m finally done!
As of today, everyone can go to my website and download my whitepaper on compliance and security.
It’s called: “18 Critical Steps Every Practice Must Know About Compliance And Security-An Insider’s Guide to meeting HIPAA and MA Data Protection Technical Guidelines.”
In it, I break down both the HIPAA laws as well as 201 CMR 17 (MA Data Protection Law)
and explain precisely what you need to do in order for your computer network to meet compliance and avoid major fines.
But also steps to take to make sure your information is protected to the fullest degree.
Oh and I used regular english instead of my normal tech-speak.
Best part is it’s FREE! So what are you waiting for? go get it! —–> www.SentinelDigital.com
On the right hand side, under the blue arrow.
Feel free to leave a comment after you read it and tell me what you thought about it.
The keys to network security for small businesses!
This video is about 2 years old but still very much relevant.
In order to be secure it takes 3 things: Technology, Procedure and Practice.
Being a small business the budget tends to be smaller but you must still think big.
Read the remainder of this entry »
The technology of mobile devices has advanced quicker than ever before.
We have smartphones, tablets & laptops nowadays.
Mobile devices continues to grow more powerful and become even more integrated into our personal and work lives. We have our email, calendars, apps that are integrated with our computer programs and much more. Smartphones and tablets can help an organization increase efficiency, productivity, and provide flexibility as well as speed.
Of course as it plays a bigger roll in our lives, it also becomes a bigger target for criminals.
Read the remainder of this entry »
This graphic shows some of the worst IT security breaches since 2005. The graph illustrates what and how breaches may occur. The introduction is interesting as 174 million records were compromised. They state that the level of threat is so great that some say it’s no longer a matter of if you get hacked, but when. With Healthcare breach notification rules, you should take steps to mitigate this risk. Read the remainder of this entry »
Since 2009, electronic data breaches occurred three times more frequently than paper-based breaches!!
This coming from the U.S. Dept of Health and Human Services. Out of the reported breaches that affected 500 or more individuals, 73% of them were electronic. Adding up to a total of 10,122,893 people who’s personal information somehow got in hands that it did not belong to. “On average, approximately 48,000 individuals were affected per electronic data breach” – Old data learns new tricks
The number 1 cause was THEFT. Read the remainder of this entry »
In the world of small business it’s hard enough covering your overhead expenses, never mind having to worry about a stupid antivirus that keeps popping up saying “renewal needed” with a ridiculous pricetag on it.
Yet small business antivirus software is critical to protecting you business. You wouldn’t leave your business proposals on the park bench. You wouldn’t consider storing your business files in an insecure location. So you shouldn’t leave your computer unprotected, or non-properly protected.
Online threats in the form of viruses, adware, spyware, Trojan horses and rootkits come in masses. A security breach at the business level doesn’t just mean a little downtime. Once you’re infected you’re looking at irreparable damage that could be caused by those infections removing your archives or physically damaging computers. Read the remainder of this entry »