Questions? Contact Sales: 888-558-3645 Live Chat Email

What is HIPAA and why your forms must be compliant

18Apr 2019
By vmradmin, VM Racks

Anyone who handles medical information has probably heard the horror stories about what happens when protected data falls into the wrong hands.

There is, for instance, the $16 million settlement that health insurance giant Anthem is paying in response to the largest U.S. health data breach in history.

In that case, hackers sent spear phishing emails to an Anthem subsidiary, where at least one employee responded to a fraudulent email and opened Pandora’s box for continued attacks. An investigation later found that the data breachRead more

What’s in a Name?

17Apr 2019
By vmradmin, VM Racks

A recent, inadvertent email disclosure in a hospital setting led to a disclosure of PHI (protected health information) – a violation of HIPAA privacy rules – for 840 patients. The incident was yet one more validation of a recent Health IT report, which found:

“Data breaches in healthcare are 50 percent more likely to stem from internal mistakes by employees than from external causes, such as hackers,” according to a recent study in JAMA Internal Medicine.”

The disclosure of PHI occurred at University Hospitals Rainbow…

Read more

Are Windows Server Platforms HIPAA Compliant

13Apr 2019
By vmradmin, VM Racks

Are Windows Server Platforms HIPAA Compliant?

Mission critical servers are valued for their longevity, and Windows is no exception. As a closed-source technology, Windows Server platforms typically have a long life-cycle, in part, because the training and manuals for the tools are proprietary, just like the software.

But similar to the Windows desktop distributions (XP, Vista, 7, 8,8.1, & 10), the Windows Server architectures can be problematic for HIPAA compliance. Yet with diligent care, a computer running Windows Server can comply with all aspects of HIPAA, and become an acceptable server on which protected health information (PHI)…

Read more

Charity and Security Begin at Home

13Apr 2019
By vmradmin, VM Racks

It’s a debated idea in our national discourse lately, and believe it or not, there’s a parallel to cybersecurity. The charity debate (as we’ll call it) comes as a question of priorities; should we only look after ourselves and our own, and let it end there?

With no political agenda here, we can say that If one truly understands charity toward fellow man – especially in its supreme expression in the “Golden Rule” – the answer would clearly be “no.”…

Read more

Why Establish a Security Culture

13Apr 2019
By Stephen Trout, VM Racks

Five “Security Culture” Markers:

    • Cybersecurity is a top-down, strategic part of the company’s vision
      Security is linked to business goals and relevant to board-level decisions
    • You’ve determined a “data blueprint” of how data is used
      Your team understands the context in which the data is created and used, and how it is subject to regulation.
    • Annual risk assessments are being conducted
      All risk areas, including staff, practices, and technology, are evaluated regularly.
    • Security skills and governance tools are becoming integrated into daily activities
      You’re enabling the latest protocols and encryption ciphers for data protection, using…
Read more

Our certifications