What Your MSP Should Know About HIPAA Compliance

The complexity of healthcare service demands robust technical infrastructure. Advances in patient treatment, research, diagnostic tools and even predictive analytics and AI have pushed technologies available to healthcare providers, which means that these organizations turn to expert providers to give them new tools and features to revolutionize their patient care models. This increased reliance on Cloud Service Providers (CSPs) or a Managed Service Providers (MSP) means that these organizations must rely on HIPAA-compliant technologies, which means counting on HIPAA-compliant vendors to provide them.

Here, we discuss why HIPAA compliance is so important to MSPs, and why MSPs must not only be compliant but work with security experts and compliant partners as part of their operations.

Read More

HIPAA Rules: The 3 Aspects of HIPAA Compliance and Their Impact on Businesses

HIPAA Rules

HIPAA compliance can be one of the most challenging tasks a company undertakes, and failure to comply is the most impactful and punitive in terms of fees and penalties. Many new organizations getting into  compliance might, in turn, feel overwhelmed by the requirements of the framework and the three primary HIPAA rules.

Here, we’ll breakdown the basics of HIPAA compliance for new organizations and what they need to think about in preparing for a compliance strategy. 

Read More

SolarWinds and SUNBURST: The Technical Risks of State-Sponsored Terrorism

solarwinds hack bug

The news cycle for anyone connected with cybersecurity has been dominated by information regarding the SolarWinds hack. This breach, starting with a single cloud and security provider, has now become a national emergency as more and more private institutions have become infected with potentially dangerous results.

As this situation unfolds, we wanted to touch base and provide background into the underlying methods and strategies used by the hackers. Following that, you can see how the attacks took place not just because of vulnerabilities in a system, but through an interconnected network of systems made vulnerable by one vendor. Finally, we provide some basic concepts to consider for your company’s security moving forward. 

Read More