The Importance of Compliance to Cybersecurity

Incidents of cloud systems having their data stolen, held hostage, leaked, or destroyed are accelerating.  2019 data breaches include: Quest Diagnostics: medical, financial, and personal information for 11.9 million subscribers Capital One: credit card information for 100 million subscribers Zynga: Personal information and Facebook IDs for 218 million subscribers In addition to these large incidents,…

The Shared Responsibility of Security Compliance Standards

An authorization or certification from a security compliance standard, verifies that an organization has met the specific industry standard for data privacy and security. Critical infrastructure companies such as, government, healthcare, finance and nuclear are required to follow various cloud information technology (IT) compliance guidelines, due to the sensitive data managed in these industries. Software…

Email Scams in Healthcare

The top cause of HIPAA breaches in the healthcare industry is due to insider threats. Oftentimes, this is accidental. Employees may snoop on medical information, send PHI to the wrong recipient, or click on a phishing email, posing a real threat to their company. No matter the reason, insider incidents continue to be the top…

Cyber Security Hindsight is Always 20/20

People say that hindsight is 20/20. You always know the right thing to do after something happens. Security professionals are no exception. They tend to react to security breaches by explaining what they would have done to keep themselves out of that situation. However, security breaches are not specific to any organization. They can happen…

Frequently Asked Questions About the Cloud

The cloud has become an incredible tool for many organizations, yet, the cloud can be tricky to understand. Project Hosts is answering frequently asked questions about the cloud.  “What is the cloud?” The cloud is a global network of servers that are hooked together and operate as a single ecosystem. Data is no longer accessed…

Possible Changes to HIPAA in 2019

Five years after the last major change, HIPAA could be receiving an update in 2019. Changes to HIPAA were proposed in 2018, but it will likely be closer to the middle of 2019 before these proposed updates will be signed into law. At the end of 2018, the Office of Civil Rights (OCR) issued a…

Project Hosts Gains Valuable Insights After Attending HIMSS19

Over 42,000 Healthcare IT Professionals roamed the exhibition floor daily during the three day conference. Attendees, from over 90 countries, engaged in over 300 educational sessions. There were hundreds of thought-provoking conversations about healthcare IT. Hot topics of conversation included interoperability, consumer-based healthcare, innovation in healthcare, and the importance of cyber security. With cyber security…

HIPAA Compliant Clouds on Azure

Project Hosts Prepares for a Great HIMSS19 Conference in Orlando, Florida

Project Hosts is attending the HIMSS19 Conference in Orlando, Florida this week and exhibiting in Booth #421. HIMSS19 Global Conference & Exhibition is the leading health information and technology conference. Over 45,000 healthcare IT professionals will gather for education, innovation, and collaboration. HIMSS hosted its first conference in 1962 and attendance continues to grow as…

The Value of a Gap Assessment

A gap assessment is a method of evaluating the difference between how a business is currently performing and where they would like to perform. This “gap” allows organizations to determine what steps must be taken to reach optimal performance. The four steps to performing a gap assessment are identifying the current state, determining where the…

Healthcare IT Security, Critical as Breathing: A Layer of Protection

The rib cage serves several important functions as it encloses the upper body, supports the spine and yet is flexible enough to expand and contract to aid in respiration.  Ribs provide a protective barrier to the lungs and heart similar to the way regulations and compliance are the protective layer over your critical data and…