Where exceptional client service meets reality.
Welcome to our new website!

X

HIPAA Compliance

Safeguarding Patient Data in EHRs

Ponemon Institute: Cyber attacks up dramatically, overall breaches down slightly at healthcare organizations

HIPAA Compliant Recommendations to Securing ePHI with Mobile Devices

Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks

Liveblogging from the HIMSS Midwest Area Chapters Fall Technology Conference

HIPAA Data Breaches Result in Hit to Patient Loyalty & High Costs

Social Media's Effect on HIPAA Privacy and Security

Online Tech Exhibits HIPAA Hosting at HIMSS Privacy & Security Forum

Standardizing Health Information Exchange Without Sacrificing PHI Security

EHR Vendor Contract Terms Clarified: BAAs Required

EMR Implementation: ‘It’s Not About the Technology, it’s About Managing Change’

Health IT Security: Raising the Bar to Protect PHI

HIPAA Violations Cost Health Insurer $1.7 Million: Lessons Learned

HIPAA Compliant Data Centers: Preventing Health Data Loss

Disabled Firewalls, Lack of Log Monitoring & Risk Analysis Lead to HIPAA Data Breach

June 2-8: Celebrate D.C. Health Data & Innovation Week

HIPAA Security Checklist for Healthcare Organizations

Indiana HIMSS Spring Conference: Health Reform and Future of Public Health

Tackling Healthcare CIO Challenges: Securing Infrastructure, IT Expertise and Costs

Indiana HIMSS Spring Conference: Innovations in HIT (Health Information Technology)

Utah Healthcare Data Breach Costs the State $9 Million

2013 HCCA: The Evolving Congressional Landscape

2013 HCCA: Latest Trends in Data Breach Threats

2013 HCCA: Hidden Liabilities in the EHR

2013 HCCA: The Defining Moments of a Data Breach

2013 IHIMA: Lawsuits by Patients for Unauthorized Disclosure of Protected Health Information (PHI)

2013 IHIMA: State and Federal Legislative Updates on Healthcare and HITECH

2013 IHIMA: Social Media and Healthcare

2013 IHIMA: Corporate Compliance for Healthcare

2013 IHIMA: Meaningful Use

Healthcare Data Breach Leads to Prison Time; Class Action Lawsuit

Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security & EHR Safety

2013 State of HIPAA Encryption & Authentication for Healthcare

Ensuring Business Associate Compliance: Are You Doing Your Due Diligence?

HHS Wall of Shame: Forty Percent of 2013 HIPAA Breaches Involved Business Associates

HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally

Interview: HIPAA Rules Effective Starting Today - Is Your HIPAA Hosting Provider Prepared?

HIPAA Compliant Hosting Case Study with Genesys Physician Hospital Organization

HIPAA in a HITECH World: Redundant Testing for High-Availability

HIPAA in a HITECH World: HIPAA Violations on the Rise, According to Director of OCR

Liveblogging HIMSS13: Secure Analytics in the Cloud

Liveblogging HIMSS 13: Mobile Devices: The Legal Landscape and Adopting Appropriate Policies

Liveblogging HIMSS13: Bill Clinton's Keynote

Liveblogging from HIMSS 13: Managing Privacy and Security Challenges of Patient EHR Portals

Liveblogging HIMSS 13: Office of the National Coordinator for Health Information Technology (ONC) HIE Town Hall

Michigan Physicians Benefit From HIPAA Compliant E-Prescribing

Meet Healthcare Disaster Recovery Expert: Chris Heuman at HIMSS 13!

Meet HIPAA Law Expert, Attorney Brian Balow at HIMSS 13!

Meet the Health IT Experts at HIMSS 13!

Final HIPAA Omnibus Rule: Business Associate Agreements & Roadmap to Compliance

Final Omnibus Rule Raises HIPAA Violation Penalties

Securing Data During Michigan's Healthcare Upheaval

No More Excuses: HHS Releases Tough Final HIPAA Privacy and Security Rules

HIPAA Omnibus Rule Narrows the HIPAA Hosting Market

mHealth Security: A BYOD Case Study Excerpt from Our Mobile Security White Paper

The Effect of Michigan Health System Mergers on Health IT

Healthcare Industry Loses $7 Billion Due to HIPAA Data Breaches

The Latest Federal mHealth Initiatives

Protecting Health Information in the Era of Mobile Devices: The Practicalities & Problems of BYOD

HIPAA? Now HIMTA: The New mHealth Bill

Small Medical Offices Big Risk to Data Security

2012 State of Mobile Health IT

Mobile Health IT: Exhibiting HIPAA Hosting at the mHealth Summit Conference

Mobile Platform-as-a-Service (PaaS) & HIPAA Hosting

Technical Solutions to Meet the OCR HIPAA Audit Protocol

Online Tech Exhibits HIPAA Hosting Solutions for mHealth

Michigan Health Information Exchange (HIE) Invests in Secure Network

Improving Michigan Healthcare IT Security

Recent Medicare Changes and Physician Payment Methods

Searching Intellectual Property

Accretive Health: No Liability

BYOD: Mobile Healthcare Policies

2012 HIPAA Violations and Audits

Overview of the SCOTUS Decision and Its Impact on Healthcare IT

mHealth: Regulation vs. Innovation

Health IT Webinars With Online Tech

mHealth & Multi-Compliance

Liveblogging from the iHT2 Health IT Summit in Fort Lauderdale, Day 2

Upcoming Webinar: Healthcare Security Vulnerabilities

Liveblogging from the iHT2 Health IT Summit in Fort Lauderdale

The HIPAA Omnibus Rule

FDA Regulation of Mobile Health Devices

Business Associate-Related HIPAA Violation Results in $750,000 Fines

mHealth: Mitigating Mobile Security Risks

2012 Indiana HIMSS Medical Informatics Summit Recap

Liveblogging from the HIMSS Medical Informatics Summit!

Benefits of Outsourcing HIPAA Hosting

Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR

HIPAA Compliant Data Center Architecture

The Impact of HITECH & HIPAA on Data Centers

HIPAA Compliant Data Centers & HIPAA Hosting White Paper

Due Diligence with Business Associates

HIT 2012 Recap

HIPAA Certified vs. HIPAA Compliant

Stage 2 Meaningful Use Implications on HIPAA Hosting

Server Hack Leads to HIPAA Violation by Utah Department of Health

HIPAA Hosting Q&A with a Certified HIPAA Practitioner & Security Specialist

Total Cost of a HIPAA Violation: 18.5 Million

HIPAA Cloud Hosting to Achieve Meaningful Use

Analyze Your Workflow Before Selecting a HIPAA Hosting Provider

The HIPAA Security Rule, According to the HHS (VIDEO)

SAS 70: Not Enough for HIPAA Compliance

Michigan HIPAA Violations

HIMSS '12: Lessons Learned from Healthcare Security Breaches

Mobile Health App Regulations: FDA & HIPAA

Business Associates Must Be HIPAA Compliant By March 2012

The Rise of the Healthcare App Industry

HIPAA Compliance Concerns with Google

Five Questions to Ask Your Business Associates: #3 Policies & Technologies

How Social Media Might Benefit Health Care and Be Meaningful to Patient Health

Five Questions to Ask Your Business Associate: Question #2 HIPAA Audits

Tactical Mobile Device Security Measures to Meet HIPAA Compliance

Five Questions to Ask Your Business Associates: #1 Breach Notification

Preventing a HIPAA Violation in 2012

Business Associates: Why Invest in a HIPAA Audit?

Top 5 Must-Read Articles for HIPAA Compliance in 2012

HIPAA Safeguards Part 1: Administrative & Assigned Security Responsibility

Healthcare IT Priorities: Comprehensive EHRs with Simple Implementation and Low Maintenance

Is your organization HIPAA-ready for 2012?

How a HIPAA Breach Can Negatively Impact Your Business

Physician Use of EMR/EHR Statistics

Sutter Health HIPAA Breach: Lessons Learned

CMS Announces HIPAA 5010 Enforcement Deadline Extension

Social Media, Healthcare IT and HIPAA Law: 2011 Update

What’s in a Business Associate Agreement?

2011-2012 HIPAA Audits Have Begun: Are You Ready to Prove HIPAA Compliance?

The Business Associate’s Role in HIPAA Violations

Free Webinar: Impact of HIPAA Compliance on Business Associates

HIPAA 5010 Deadline Approaching: Taking Steps toward Implementation

Upward Trend of Consumer Use of EHRs; Slower Trend of Meaningful Use Attestation

HIPAA Compliant IT Security and Best Practices

HIPAA & Health IT: $872 Million in Incentives

Nine Components of a HIPAA Risk Analysis

Nationwide Awareness Initiatives: Cyber Security and Health IT

Lost Military Backup Tapes Results in HIPAA Violation Affecting 4.9 Million

OCR Audit Requirements Following a Self-Reported HIPAA Breach

HIPAA Violations By State

Prevent Increasing Costs of a Data Breach: Invest in HIPAA Hosting

Health IT Stimulus Funding Increases Demand for HIPAA Compliant Hosting

Effects of HIPAA Breaches: Why Investing in HIPAA Compliant Hosting Makes Sense

Health & Human Services Getting Serious on HIPAA Violations