Possible Changes to HIPAA in 2019

Five years after the last major change, HIPAA could be receiving an update in 2019. Changes to HIPAA were proposed in 2018, but it will likely be closer to the middle of 2019 before these proposed updates will be signed into law. At the end of 2018, the Office of Civil Rights (OCR) issued a…

Project Hosts Gains Valuable Insights After Attending HIMSS19

Over 42,000 Healthcare IT Professionals roamed the exhibition floor daily during the three day conference. Attendees, from over 90 countries, engaged in over 300 educational sessions. There were hundreds of thought-provoking conversations about healthcare IT. Hot topics of conversation included interoperability, consumer-based healthcare, innovation in healthcare, and the importance of cyber security. With cyber security…

HIPAA Compliant Clouds on Azure

Project Hosts Prepares for a Great HIMSS19 Conference in Orlando, Florida

Project Hosts is attending the HIMSS19 Conference in Orlando, Florida this week and exhibiting in Booth #421. HIMSS19 Global Conference & Exhibition is the leading health information and technology conference. Over 45,000 healthcare IT professionals will gather for education, innovation, and collaboration. HIMSS hosted its first conference in 1962 and attendance continues to grow as…

The Value of a Gap Assessment

A gap assessment is a method of evaluating the difference between how a business is currently performing and where they would like to perform. This “gap” allows organizations to determine what steps must be taken to reach optimal performance. The four steps to performing a gap assessment are identifying the current state, determining where the…

Healthcare IT Security, Critical as Breathing: A Layer of Protection

The rib cage serves several important functions as it encloses the upper body, supports the spine and yet is flexible enough to expand and contract to aid in respiration.  Ribs provide a protective barrier to the lungs and heart similar to the way regulations and compliance are the protective layer over your critical data and…

Healthcare IT Security, Critical as Breathing: Viruses

It is common knowledge that the immune system becomes compromised when a virus attacks a host cell, causing infection and discomfort. Once a virus has entered the body, infection begins and can take days even weeks to resolve. In the same way, hackers and unauthorized users can compromise information by embedding viruses that can spread…

Healthcare IT Security, Critical as Breathing: Seek out Experts

Individuals who suffer from breathing complications, asthma, or lung ailments seek care from a Pulmonologist, not an Orthodontist. Although they are both doctors, the specialization and expertise that one has over the other makes all the difference. Individuals prefer the best care and medical advice available to them, so it’s no surprise that they seek…

Healthcare IT Security, Critical as Breathing: Constant Monitoring

A patient in the Intensive Care Unit (ICU) with breathing complications receives personal, round-the-clock support to ensure that they are receiving the finest care possible. This constant monitoring, provided by experts, allows for family members to focus more on one another. Just as an ICU patient receives exceptional care, our security and compliance experts maintain…

Healthcare IT Security is as Critical as Breathing

Cyber security can be complicated to understand and, in some cases, can be overlooked out of lack of understanding. However, healthcare IT security is as critical as breathing. Just as you breathe to ensure that your body lives, a healthy cyber security system ensures that your business functions without the real threat of shutting down.…

HIMSS19

Project Hosts Offers Valuable Gap Assessment Online and at HIMSS19

Project Hosts will be offering a free HIPAA Healthcare Cloud Gap Assessment while exhibiting at HIMSS19 in Orlando Florida, February 11-15. Join us at Booth 421 or visit our site at: projecthosts.com/himss19 to access our online version of the Gap Assessment any time. The assessment is derived from the leading healthcare IT security standards and…