In a world facing daily cyberattacks and security vulnerabilities, do you know how secure your practice is? The scary fact is that many practices don’t know if they have the correct safeguards in place, or
Security Risk Assessments (SRA) have been a required (and sometimes dreaded) guideline since 2009. They’re enforced as a part of the HIPAA Security Rule and are required to be completed annually by all covered entities.
Process is learned and developed over time and through years of experience. Process requires theories, tests and failures. It’s my personal motto, and certainly applicable to my work in marketing. In fact, my computer desktop
If you’ve been following along (and we hope you have been), you’ve heard us talk about the Zero-Footprint Movement and how to plan for transitioning to a no-hardware IT environment. By now, you might be
What’s going on? A security vulnerability, known as “Meltdown” or “Spectre,” depending on the variant, has been identified that affects several CPU chipsets. More specifically, this vulnerability could be exploited to interrupt the connection between
Last month, we talked about how an industry-wide change is happening in the Zero-Footprint movement. The transition from onsite hardware to cloud-based services is happening across all industries, specifically highly-regulated industries like healthcare and financial
While the future of cloud computing is certainly bright, the understanding of cloud computing terminology seems to be, well, cloudy. We’ve collected the most misunderstood cloud computing terms in hopes make the process simple and
We’re nearing the end of 2017 and technology continues to evolve at a break-neck pace. Managing Partners, Practice Administrators, CEOs and CIOs are exhausted from trying to match their hardware investment to this rapid evolution.