Phoject Hosts

Project Hosts delivers turnkey security and compliance on Azure for healthcare companies

      A Microsoft partner for more than 15 years, Project Hosts is an industry-leading expert in Azure and a Microsoft Gold Cloud Platform competent Cloud Service Provider (CSP) specializing in securing applications, data, and workloads in Microsoft Azure while ensuring compliance with regulatory standards, including HIPAA, HITRUST, ISO 27001, FedRAMP, and DoD IL…

Read more
HIMSS20 Booth 415

Project Hosts to Exhibit at HIMSS 2020

    Project Hosts will be exhibiting at HIMSS 2020 in Orlando Florida on March 9th through the 13th. Project Hosts has established themselves as a leader in hosted security and compliance. By achieving FedRAMP and DoD compliance, Project Hosts has set a  precedence for meeting rigorous standards and on-going policy and procedure best practices.…

Read more
Secure Medical Devices

How Secure are your Cloud-Based Medical Devices

As companies in most verticals become more aware of the scalability, flexibility, security, backup and recovery capabilities of cloud computing, they are migrating to the cloud in growing numbers. The medical device industry is slow to migrate in comparison to other healthcare sectors, however, the aforementioned benefits outweigh the risks and experienced cloud solution providers…

Read more
turnkey solutions

The most valuable technologies in Healthcare IT?

When Health IT News asked Ellen Wiegand, Vice President and CIO at Virginia Mason Health System, what new technologies she was most excited about in regards to Healthcare IT, she began her answer by mentioning the industry’s most trending topics, AI and Process Automation. As she continued with her answer, she shifted to healthcare consumers…

Read more

Email Scams in Healthcare

The top cause of HIPAA breaches in the healthcare industry is due to insider threats. Oftentimes, this is accidental. Employees may snoop on medical information, send PHI to the wrong recipient, or click on a phishing email, posing a real threat to their company. No matter the reason, insider incidents continue to be the top…

Read more

The Shared Responsibility Model

Sometimes, when information is stored on the cloud, miscommunication and lack of coordination can cause confusion. Organizations begin to question who is responsible for IT security. A new HITRUST program is offering clarity on the issue. Hector Rodriquez and Matthew Datel, published an article on the HITRUST Alliance Blog, describing the new Shared Responsibility Program.…

Read more

Cyber Security Hindsight is Always 20/20

People say that hindsight is 20/20. You always know the right thing to do after something happens. Security professionals are no exception. They tend to react to security breaches by explaining what they would have done to keep themselves out of that situation. However, security breaches are not specific to any organization. They can happen…

Read more