
The HIPAA compliant resources on this page will give you the advantage you need to start to assess the status of your compliance. Our free tools and educational resources come from the top HIPAA experts in the country who are working with us to help you succeed. Please feel free to download and utilize our HIPAA compliant resources – and to contact us directly if you have any questions about becoming HIPAA compliant.
Stay Updated on the Latest HIPAA News
How to Limit the Cost of Data Breaches
Ponemon Institute conducted their “Cost of a Data Breach Report” in conjunction with IBM Security, in which they surveyed more than 500 organizations. The report cited that the average cost of a data breach [...]
Content Requirements for a HIPAA Breach Notification
Under the HIPAA Breach Notification Rule, covered entities, following a breach of unsecured protected health information (PHI), must provide notification of the breach to affected individuals. HIPAA breach reporting content requirements for [...]
How MSPs Can Break Into the Healthcare Vertical
The healthcare industry is the fastest growing industry in the U.S. economy and it is also the most vulnerable. Ransomware attacks are targeting healthcare organizations with increasing frequency, this is in [...]
$10K HIPAA Fine Issued to Dental Practice for Disclosing PHI on Yelp
Elite Dental Associates was issued a $10,000 HIPAA fine for disclosing the protected health information (PHI) of one of its’ patients while responding to a review on Yelp. The dental practice responded to the [...]
September Healthcare Breaches Affected 1,928,433 Individuals
September healthcare breaches reported to the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) affected 1,928,433 individuals. The majority of the 33 reported September healthcare breaches were the result of [...]
Ransomware Healthcare Attacks Continue to Strike
Ransomware healthcare attacks should be a cause for concern for anyone working in healthcare. Ransomware attacks occur when an unauthorized party accesses an organization’s network, encrypting files until a sum of money is paid [...]
















