Sal Marino

5 ways to evaluate HIPAA-compliant storage services

5 ways to evaluate HIPAA-compliant storage services

The health insurance portability and accountability act (HIPAA) was introduced in 1996, when the information technology landscape looked very different to how it does today. As such, it is often difficult to interpret in the context of a modern IT environment, which typically makes use of a wide range of hosted services and mobile technologies. Neither of these things existed in any significant ...

Examples of Unintentional HIPAA Violations: Ensure You Don’t Make Them

Examples of Unintentional HIPAA Violations: Ensure You Don’t Make Them

Every healthcare organization wants to avoid violating regulations under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). According to HIPAA, only staff involved in patient care, healthcare billing, and other critical processes should have access to patient health information (PHI). Additionally, these people should have only minimal access to private data. In other ...

How Much Can HIPAA Violation Fines Cost Your Business?

How Much Can HIPAA Violation Fines Cost Your Business?

  The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires covered entities and business associates to keep electronic protected health information (ePHI) secure. Any violations of HIPAA regulations are subject to financial penalties and/or corrective action plans enforced by the Health and Human Services' Office of Civil Rights.

How Managed IT Services Can Help With SOC 2 Certification Requirements

How Managed IT Services Can Help With SOC 2 Certification Requirements

Successful service-based organizations understand the importance of focusing on their core competencies, one of which is the ability to protect customer data. SOC 2 compliance covers five partially overlapping trust services principles that validate your efforts to keep client data safe from unauthorized access and other threats. These SOC 2 common criteria are security, availability, processing ...

What Is SOC 2 Compliance And Why Is It Important For Your Business?

What Is SOC 2 Compliance And Why Is It Important For Your Business?

Information security is essential for every organization, especially those that provide technical solutions and services to their clients. These companies often bear the responsibility to protect highly sensitive data on behalf of others. As such, a security incident can cause major damage to brand reputation and even leave your organization exposed to litigation.