Category Archives for Blog

HIPAA Compliant Cloud Hosting: Baseline and Best Practices

Choosing a datacenter designed specifically for HIPAA compliant hosting is the quick path to compliance for your IT system. There are plenty of cloud providers out there that claim HIPAA compliance, but what they’re actually selling is business as usual IT with some HIPAA keywords in their marketing materials.This is a guest post written by […]

NueMD’s 2016 Survey Shows HIPAA Awareness is Increasing

NueMD is a cloud-based medical billing service that administered a HIPAA compliance survey in 2014. The survey intended to gauge knowledge of regulations and compliance measures. In 2016, they issued a follow-up survey to evaluate the change in HIPAA compliance and awareness over time. The 2016 NueMD survey received 927 total responses, 86% from medical […]

On Amazon AWS HIPAA Compliance (and How to Get There)

Amazon AWS HIPAA Compliance: How to Get ThereWe field a ton of questions on Amazon AWS HIPAA compliance: is Amazon AWS HIPAA compliant? Can it be? No worries. We’ve got the answers here. Are you thinking about using Amazon Web Services (AWS) to build applications that are compliant with the US Health Insurance Portability and Accountability […]

Why You Should Choose a HIPAA Compliant Fax Service

Introduction to HIPAA Compliant Fax Services: 5 Tips for SafetyHIPAA compliance umbrellas everything done in your practice, and this includes having a HIPAA compliant fax system. Learn how to keep yours secure with these tips. The Health Insurance Portability and Accountability Act (HIPAA) requires that covered entities, including health care providers and their industry partners, protect […]

Comparing Email Encryption Services

Email has become an essential way for people to communicate. As technology has continued to progress, so too have the potential risks that can arise from sending and sharing information online. This is a guest post written by Laura Miller, Compliance Manager of Aspida. Personal information and data are oftentimes targets of cyber-attacks and can put this […]