What is Ping? Well, Ping is a legacy program that will send a short message to a network client, and then wait for a reply back from the client. It uses the old ICMP protocol. Will will help you solve your network problems by verifying connectivity across the network. Ping is the key to your solution. Almost any network endpoint will reply back to a ping, unless they have disabled it in the firewall.  In

Read more 0

HIPAA Horror Stories How Is Your HIPAA? These preventable HIPAA horror stories happened when a covered entity or a business associate was hit with either malware, external hackers or click happy insiders. No matter how it happened, confidentiality was breached, integrity was failed, and/or availability was compromised.  The result is the same in all cases. A large expenditure of resources and man-hours to recover data, clean up systems, restore functionality, and lots of explaining and

Read more 1

What are HIPAA business associates? Are they held to the same healthcare privacy and security requirements as covered entities? Any individual or entity that performs functions or activities on behalf of a covered entity that requires the business associate to access PHI is considered a business associate, according to HHS. For example, your outside IT contractor that maintains the IS in your medical practice would be a business associate. Even the cloud service provider that

Read more 0