The Importance of Compliance to Cybersecurity

Incidents of cloud systems having their data stolen, held hostage, leaked, or destroyed are accelerating.  2019 data breaches include: Quest Diagnostics: medical, financial, and personal information for 11.9 million subscribers Capital One: credit card information for 100 million subscribers Zynga: Personal information and Facebook IDs for 218 million subscribers In addition to these large incidents,…

Outsource Your Security Compliance Needs to Grow Your Business

How your Organization can benefit from outsourcing your Security Compliance needs Today there are countless standards, mandates, laws and regulations that organizations are required to adhere to depending on what industry you are selling your application to. With all of the compliance requirements and the ever shifting IT landscape, it is certainly challenging – if…

Email Scams in Healthcare

The top cause of HIPAA breaches in the healthcare industry is due to insider threats. Oftentimes, this is accidental. Employees may snoop on medical information, send PHI to the wrong recipient, or click on a phishing email, posing a real threat to their company. No matter the reason, insider incidents continue to be the top…

The Shared Responsibility Model

Sometimes, when information is stored on the cloud, miscommunication and lack of coordination can cause confusion. Organizations begin to question who is responsible for IT security. A new HITRUST program is offering clarity on the issue. Hector Rodriquez and Matthew Datel, published an article on the HITRUST Alliance Blog, describing the new Shared Responsibility Program.…

Cyber Security Hindsight is Always 20/20

People say that hindsight is 20/20. You always know the right thing to do after something happens. Security professionals are no exception. They tend to react to security breaches by explaining what they would have done to keep themselves out of that situation. However, security breaches are not specific to any organization. They can happen…

Frequently Asked Questions About the Cloud

The cloud has become an incredible tool for many organizations, yet, the cloud can be tricky to understand. Project Hosts is answering frequently asked questions about the cloud.  “What is the cloud?” The cloud is a global network of servers that are hooked together and operate as a single ecosystem. Data is no longer accessed…

Project Hosts Gains Valuable Insights After Attending HIMSS19

Over 42,000 Healthcare IT Professionals roamed the exhibition floor daily during the three day conference. Attendees, from over 90 countries, engaged in over 300 educational sessions. There were hundreds of thought-provoking conversations about healthcare IT. Hot topics of conversation included interoperability, consumer-based healthcare, innovation in healthcare, and the importance of cyber security. With cyber security…

HIPAA Compliant Clouds on Azure

Project Hosts Prepares for a Great HIMSS19 Conference in Orlando, Florida

Project Hosts is attending the HIMSS19 Conference in Orlando, Florida this week and exhibiting in Booth #421. HIMSS19 Global Conference & Exhibition is the leading health information and technology conference. Over 45,000 healthcare IT professionals will gather for education, innovation, and collaboration. HIMSS hosted its first conference in 1962 and attendance continues to grow as…

Healthcare IT Security, Critical as Breathing: A Layer of Protection

The rib cage serves several important functions as it encloses the upper body, supports the spine and yet is flexible enough to expand and contract to aid in respiration.  Ribs provide a protective barrier to the lungs and heart similar to the way regulations and compliance are the protective layer over your critical data and…

Healthcare IT Security, Critical as Breathing: Viruses

It is common knowledge that the immune system becomes compromised when a virus attacks a host cell, causing infection and discomfort. Once a virus has entered the body, infection begins and can take days even weeks to resolve. In the same way, hackers and unauthorized users can compromise information by embedding viruses that can spread…