Email Scams in Healthcare

The top cause of HIPAA breaches in the healthcare industry is due to insider threats. Oftentimes, this is accidental. Employees may snoop on medical information, send PHI to the wrong recipient, or click on a phishing email, posing a real threat to their company. No matter the reason, insider incidents continue to be the top…

DoD IL5 PATO Holders

DoD Impact Level 5 PATO compliance is one of the hardest and strictest compliance authorizations that an organization can achieve. Only six companies have ever received an IL5 authorization from DISA. Currently only four companies still hold their DoD IL5 PATO authorization. The four companies that currently hold a DoD IL5 PATO include Oracle, DISA,…

Project Hosts Provides Controls Above the Azure Level

When selecting a cloud provider, many organizations believe that they are receiving full coverage of compliance controls. In reality, many cloud providers only provide about 15% of controls needed to become compliant. That leaves your organization to cover the remaining 85% of controls. This takes a large sum of resources away from your end mission.…

Project Hosts Makes Federal Cloud Adoption Easy

The cloud continues to be a valuable tool and a long-term investment across all industries. The Federal Government is no exception, as cloud adoption continues to increase across government agencies as well. A survey discovered that 1 in 5 federal government IT decision-makers is ready to provision cloud services and/or operate cloud environments. Within the…

The Shared Responsibility Model

Sometimes, when information is stored on the cloud, miscommunication and lack of coordination can cause confusion. Organizations begin to question who is responsible for IT security. A new HITRUST program is offering clarity on the issue. Hector Rodriquez and Matthew Datel, published an article on the HITRUST Alliance Blog, describing the new Shared Responsibility Program.…

Cyber Security Hindsight is Always 20/20

People say that hindsight is 20/20. You always know the right thing to do after something happens. Security professionals are no exception. They tend to react to security breaches by explaining what they would have done to keep themselves out of that situation. However, security breaches are not specific to any organization. They can happen…

FedRAMP Made Easy

Government agencies looking to deploy in the cloud, or those looking to provide cloud services to government agencies, must be FedRAMP compliant. The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program. It provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP is mandatory at…

Project Hosts Gains Valuable Insights After Attending HIMSS19

Over 42,000 Healthcare IT Professionals roamed the exhibition floor daily during the three day conference. Attendees, from over 90 countries, engaged in over 300 educational sessions. There were hundreds of thought-provoking conversations about healthcare IT. Hot topics of conversation included interoperability, consumer-based healthcare, innovation in healthcare, and the importance of cyber security. With cyber security…

HIPAA Compliant Clouds on Azure

Project Hosts Prepares for a Great HIMSS19 Conference in Orlando, Florida

Project Hosts is attending the HIMSS19 Conference in Orlando, Florida this week and exhibiting in Booth #421. HIMSS19 Global Conference & Exhibition is the leading health information and technology conference. Over 45,000 healthcare IT professionals will gather for education, innovation, and collaboration. HIMSS hosted its first conference in 1962 and attendance continues to grow as…

Project Hosts Joins the Microsoft Ignite Tour in DC

Project Hosts’ Federal team will be exhibiting at Microsoft Ignite Tour in Washington D.C. February 4-5, 2019. Microsoft Ignite is an annual conference for developers and IT professionals. The government-wide Federal Risk and AuthorizationManagement Program (FedRAMP), is a regulated approach to security assessment,authorization, and continuous monitoring for cloud products and services. As a result, Federal…