Category Archives: Compliance

Is OpenDNS Umbrella HIPAA Compliant?
So the question your asking Is OpenDNS Umbrella HIPAA Compliant? Surely OpenDNS Umbrella and its software client is questionable, right? Is this a breach of HIPAA Compliance?
Lets Review The Basics…
Lets go back to the basics, OpenDNS is a … Read the rest

TOP Horrible Passwords To Use For 2020
How many Horrible Passwords are there? Let me tell you there are about 500 of them and we will show you the TOP Horrible Passwords To Use For 2020. Any password documented publicly or available in the darkweb can be … Read the rest

CoronaVirus Business Continuity Plan Checklist
No one can predict the future; however, you can be ready with a sound CoronaVirus Business Continuity Plan. This CoronaVirus business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is … Read the rest

Your Not HIPAA Compliant Using Windows Server 2008
If your using Windows Server 2008 or older on your network it makes you none HIPAA Compliant and should be ashamed for putting your clients and patient information at risk.
What Windows Server 2008 “END OF LIFE” and HIPAA mean
… Read the rest
Your Not HIPAA Compliant Using Windows 7
If your using Windows 7 or older on your network you are not HIPAA Compliant and should be ashamed for putting your clients and patient information at risk.
What WINDOWS 7 “END OF LIFE” and HIPAA mean for you?
… Read the rest
Is Microsoft Teams HIPAA Compliant?
Many still seem to wonder and ask what is Microsoft Teams and is this software questionable for use? This includes compliance and security officers in the Healthcare industry leading them to ask is this HIPAA Compliant? However lets go back … Read the rest

What Are The Top Office365 HIPAA Mistakes
Office365 is a fantastic product, and it can certainly be HIPAA-compliant. But only if you take the time to set everything up the right way for the organization.
Here the top Office365 HIPAA mistakes that we see organizations make:
Free

5 Points To Success In A Zero Trust Model
If you did not know already, a Zero Trust security model is based on the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment controls to monitor and manage data between zones, and more … Read the rest

Best HIPAA Compliant UTM Firewalls
Do you know what UTM firewalls are the best to use to be HIPAA compliant? Is your Network Secure? How is your organization doing with UTM Firewall logging? If you don’t know the answer to these questions, you’re not alone. … Read the rest

Simple Checklist For Creating A Business Continuity Plan
No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is a simple … Read the rest