Under HIPAA, every practice large and small is required to designate a privacy officer. Many times, this role is given to the office manager or to the dentist. Under the HIPAA Privacy Officer title, this officer will need to dole
Stolen Cellphone without Mobile Device Management Leads to Breach
St. Peter’s Health Partners Reports Data Breach from Stolen Cellphone A data breach of a large hospital system occurred from a stolen cellphone belonging to one of the health system’s managers. As reported in Albany Business Review, the breach required notification
8 Unlikely HIPAA Data Breaches
Here are some unexpected sources of HIPAA data breaches Your data security plan likely focuses on your server, workstations, backup and external media. However, no matter how robust your security solution is, training and compliance must be met consistently among
Encrypted Email – a HIPAA requirement
Encrypted Email: Why You Need It If you are like most dental practices, you have gone through the steps to encrypt the data on your server. Your backups are encrypted, your shared folders are encrypted, and maybe even your PCs.
Mobile Device Security – Malware is now a Concern
Mobile Device Security is becoming more and more a necessity, as malware for Androids, iPads and iPhones become more prevalent. Mobile devices are popular in the dental industry. Not only are personal cell-phones being configured to check the office’s email
HIPAA Compliant Remote Access for your Dental Practice
By Dan Gospe HIPAA Compliant Remote Access from Anywhere With so many options for remote access on the market, accessing your dental office remotely has never been easier. Here are some things to keep in mind for your remote access
TeslaCrypt Strikes
TeslaCrypt: A New Version of Ransomware By now, you’ve all heard of ransomware viruses which encrypt your data, and demand a ransom paid in BitCoin in order to decrypt. This week, we’ve seen our first iteration of this new virus,
Group Policy – Unstoppable Network Security with your Windows Server
Enforce Network Security with Group Policy on your Windows Server A Windows Server comes with a powerful tool called Group Policy, which when configured, enforces strict security protocols across all of the PCs on your network. Group Policy allows for
Buying a Business PC – What to Look For
Buying a Business PC – What to Look For By Dan Gospe It is very tempting these days to find the cheapest system on sale and deem it your “business PC,” but there are special considerations to make before jumping
Content Control – Why Limiting Internet Browsing is a Good Idea
By Dan Gospe Limiting Internet Browsing through Content Control Many businesses are choosing to limit internet browsing by its employees, as browsing can serve as a distraction and impact productivity. However, there is yet another reason to implement content control