Blog

Powered by the team at Connectria

 
Can HIPAA Data Be Stored in the Cloud?
Healthcare organizations are increasingly being tasked with securely handling the vast amount of electronic protected health information (ePHI) they obtain through multiple forms of technology.…
 
Are Smartphones HIPAA Compliant?
According to Pew Research, 81% of Americans now own a smartphone, and many employers are implementing BYOD (Bring Your Own Device) policies, which allow workers…
 
Why You Should Build Automation into Your Cloud Migration Plan
When migrating to the cloud, many organizations focus on which cloud platform suits their workloads best and how they can keep their workloads secure and…
 
6 Ways to Avoid a Cloud Migration Failure
A recent research study on the success of cloud migrations has some disheartening news for organizations looking to migrate on-premises workloads to the cloud: 62%…
 
What is a Managed Hybrid Cloud Hosting Provider?
The vast majority of organizations house at least some workloads in the cloud, and many of them in multiple cloud environments. The IBM Institute for…
 
The Other Cyberattack Healthcare Providers Need to Watch Out For
It seems like 2019 has been the Year of the Ransomware attack in healthcare. According to McAfee’s August Threat Report, ransomware attacks grew by 118%…
 
Burnout in Technology Leadership (and what to do about it)
For all the ways in which technology dominates business news and business blogs, it’s surprising that people are not talking more about a very pervasive…
 
It’s Time to Add Social Media to Your HIPAA Compliance Checklist
Whether they’re not-for-profits or more commercially focused operations, healthcare providers are in the business of healthcare. That means they care about developing relationships with their…
 
Know Your Audit Reports! More Advice on Vetting Cloud Providers
In a recent post, we discussed four ways to vet a cloud provider before trusting them with your mission-critical workloads. If you missed that post,…
 
It’s Time to Be Honest About IT
Most people are familiar with the saying fake it until you make it. We might even be able to name people who have made it…
 
What if it Happens Again?
Could Your Business Afford a Second Ransomware Attack? There’s an old saying that lightning never strikes the same place twice. Experts say that isn’t true,…
 
8 Ways to Lower the Cost of Data Breach Remediation
According to the Ponemon Institute’s latest Cost of a Data Breach Study (sponsored by IBM Security), the average cost of a data breach has risen…
 
What Should You Look for in a Hosting Provider?
Physical Security is a Must-Have Trusting your systems and data to a third-party provider can be a risky business. Of course, many data center operators…
 
4 Ways to Vet a Private Cloud Provider
Private Clouds Remain Popular – And for Good Reason! While Azure and AWS are becoming ever-more popular and better suited to more types of workloads,…
 
What’s the Difference Between HIPAA and HITECH?
HIPAA is a regulation that’s gets talked about a lot. But there are other industry regulations that healthcare providers – as well as those that…
 
Why Multi-Cloud Strategy Beats Single Cloud Almost Every Time
Our economy is an increasingly digital one, which not only means more pressure on infrastructure, but also higher user demands when it comes to things…

Subscribe to our Blog!