Get in touch


Is That Video HIPAA Compliant?

Video is becoming a big part of our lives.

We post short clips on our social media feeds.
We store live data in our security systems.
We use telehealth practices to meet with patients.
We market our practices with stories and information.

Is all of that data HIPAA compliant?

Understanding HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) requires all healthcare organizations and practices to ensure the privacy of their patient’s protected health information (PHI). At all times, no matter what type of information is gathered, healthcare providers must ensure personal data covered by HIPAA isn’t released or compromised without proper approval.

Anonymize Your PHI With These Strategies

Managing your EHR data can sometimes feel all-consuming. Are you doing everything in your power to keep your data safe and secure?

According to the HIPAA Privacy Rule, restrictions only apply to individually identifiable protected health information (PHI). If you can de-identify PHI so the identities of individuals cannot be discovered, PHI can be freely shared.

There’s a New Threat That Makes Medical Devices Vulnerable

Log4j is a tool used to help a programmer create output log statements to a variety of output targets. When you have a problem somewhere in the system, this tool is useful to have a log of data to sort through to help locate the issue. It’s part of the open-source library, meaning it’s used across many popular apps and websites, and is located on potentially hundreds of millions of devices across the world.

Why Mobile Credentials Are Important to a Growing Practice

Remember when you needed separate keys or cards for everything you did? You kept keys on a keyring, or cards in a wallet, pulling each out depending on where you were and where you were going.

But wallets and keyrings can be lost or misplaced. Depending on your lifestyle, you could end up with a pocketful of entry tools, one each for every single thing you needed access to.