Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

4 Reasons Why It is Important to Have Secure Business Associates

HIPAA Business Associates Data Security

The number of breaches of unsecured protected health information (PHI) on record in the United States is over 2000 and counting. Significantly, these records only cover breaches affecting 500 or more individuals. One can only wonder how many more breaches have occurred on a smaller scale. The types of breaches range from theft and hacking, to improper disposal and unauthorized access as a result of negligence. Such incidents can be avoided if covered entities (companies involved in healthcare) ensure that all of their business associates are secured. There are many reasons why it is important to have secure business associates. Being aware of these reasons may prompt covered entities to take the necessary measures to protect their clientele's information:

[Read More]

7 Tips to Help Protect Yourself Against Hackers

Tips for Protection from Hackers

In October of 2016, a massive cyber attack against Dyn, a New Hampshire-based company that monitors internet traffic, blocked user access to many popular websites like Amazon, Twitter and Paypal. Hackers used a simple program that even novice hackers could use to access any device connected to Wifi. This is one of approximately 3000 cases in 2016 alone. Unfortunately, it is not possible to make yourself 100% hack proof, but here are some ways that you can make it difficult for hackers to access your information:

[Read More]

6 Key Components of a Service Level Agreement (SLA)

Service Level Agreements (SLA) Terms of Service

For businesses and consumers alike, ensuring that concise service level agreements (SLA) are obtained for certain products is crucial to seamless operation and support. As Naomi Karten explains in her work on establishing service level agreements, "A service level agreement is a formal negotiated agreement which helps to identify expectations, clarify responsibilities, and facilitate communication between two parties, typically a service provider and its customers." Therefore, the SLA serves an important purpose as a communication and conflict-reduction tool, as well as an overall expectation management document.

[Read More]

2 Important Recommendations That Can Help Ensure HIPAA Compliance

HIPAA Compliance Tips

For healthcare organizations, remaining HIPAA compliant can be both necessary and challenging. In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms.

In an article by Kristen Lee, titled Q&A: The main reason healthcare organizations violate HIPAA, an interview is conducted with Michael Archuleta, director of IT and HIPAA security officer at Mt. San Rafael Hospital in Trinidad, Colorado. It is within this interview that Archuleta recommends two important items that can ensure HIPAA compliance:

[Read More]

4 Simple Tips to Improve Cyber Security Hygiene

Cyber Security Tips

Each year, Verizon compiles a Data Breach Investigations Report (DBIR). It is a comprehensive summary of data security threats and breaches that helps to better understand the landscape of cyber security.

[Read More]

Understanding the Basics of Service Level Agreements

Customer Service & Help Desk Service Level Agreements

A service level agreement (SLA) usually refers to the contract between an end-user and a service provider. A completed SLA provides information on specifics, maintenance and other features pertaining to what the customer will receive as a part of the commitment with a provider.

[Read More]

The Risks and Benefits of Shadow IT

Shadow IT Technology

Shadow IT is a term used to describe solutions and systems created and applied inside organizations without their authorization. While they may not be authorized and can pose security risks, these solutions can aid in the development of new IT solutions.

[Read More]

The Increasing Strength of CSR to Change the Face of Business

CSR & Business

Any large company executive knows that corporate giving is an essential piece of their business model. What started in the mid-twentieth century as a grassroots effort to limit the power and spread the wealth of large for-profit businesses, has now been embraced by top corporations to better their company and community. The result is a revolutionized standard for how we view and operate businesses. With the ever-growing ability to interact with potential customers, corporations have discovered that people respond well to benevolence; they support the business that supports others and makes a positive impact in their community. Corporate social responsibility has successfully woven itself into the corporate world, and not only is it here to stay, it seems to be growing in power, presence, and profit.

[Read More]

Why HIPAA Violations are Becoming Common Among Healthcare Organizations

HIPAA Compliance Healthcare Organizations

In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms. When healthcare organizations are looking for cloud solutions to manage their data, ensuring that it is HIPAA compliant is a necessity.

[Read More]

New Cybersecurity Laws for Canadian Businesses Coming Soon

Canadian Digital Privacy Act Cyber Security

It is no secret that Canadian businesses have struggled to bridge the gap between protecting both personal and financial data within their organizations. As a component of the Digital Privacy Act that was passed in 2015, the Canadian government is now in the final stages of enforcing legislation that will require all businesses in Canada to report any cyber security breach immediately.

[Read More]

 

1   2   3   4   5   6   ...   63     Older Entries