Over the past couple of years, the HIPAA Omnibus Rule has been hovering its head over health care organizations, Software-as-a-service (SaaS) companies and anyone holding, processing, or transmitting Electronic Protected Health Information (ePHI) and Electronic Health Records (EHRs). With 2014 in full swing, organizations that consider themselves to be Business Associates (BAs) and Covered Entities (CEs) need to be looking at their policies and procedures, because the OCR may be knocking on your door this upcoming year. So what did …

With 2013 wrapping up and 2014 close on the horizon, many organizations are reviewing their IT infrastructure needs. For some, it’s an active, ongoing conversation; others wish they could sweep that discussion under the desk for another year. Regardless of your business objectives, you and your organization need to explore these questions to find the right vendor to entrust with your IT infrastructure needs. 1.) What solution will work best for our organization’s needs? Know and rank your business priorities. …

There’s no question that our society is embracing the technology that is in front of us. You can go back almost 25 years and in 5 year gaps, see the massive innovation and technological impact that our society is seeing on an everyday basis. In the US today, more than 50% of cell phone purchases are now smartphones, up from 21% two years ago. With this massive increase in mobile computing, security has become the focal point. However, it has …

It’s no surprise that computing, applications, and data storage have been creeping ever so more and more into the idea of “the cloud.” Cloud computing is becoming more and more prevalent in everyday computing and has no signs of slowing down from a personal perspective, and soon to be from an enterprise perspective. From a personal perspective, I can say that cloud computing is definitely the future and is here to stay. I can remember a few years ago when …

Over the past decade, we’ve seen the way we do business get flipped upside down. A lot of business processes we used to do on pen and paper are now being automated and processed online, allowing data to be accessed in many different ways. While in some ways this has benefited us in productivity and created many headaches (for the most part), this has also left our data more vulnerable due to increasing the amount of associated access points, which …

With smartphones and social media platforms becoming a major means of communication between friends, family and co-workers, we have come to appreciate the evolution of mobile applications. With over 500,000 apps on iPhone, 350,000 on Android and thousands more on other operating systems, there are many different apps out there that offer many different services and solutions to its users. In order for these apps to work, they require permissions to use certain features of your phone in order to …

According to a recent Gartner study, smartphones accounted for 297 million (19%) of the 1.6 billion mobile phones sold in 2010. That’s 72.1% more smartphone sales than in 2009 and it doesn’t appear to be slowing down for 2011 and beyond. The advancements that have been made in the mobile market have been nothing more than unbelievable. Your phone is not only a means of verbal communication, but an email-checking, web-browsing multimedia device. With that however, more and more of …

No company is exempt from a disaster. Google has had outages in their Docs, Gmail, and other applications that have affected millions of users who use their services on an everyday basis. In April 2011, Sony was attacked when hackers got access to over 77 million users’ personal information, including credit card numbers through its PSN Network. Big or small, it’s inevitable that your company will experience some sort of disaster in its lifetime. However, having a plan in place …

Choosing where to store your data, whether internally or to an outside hosting provider, is a very important decision for any company these days. In addition, your IT staff is becoming more and more important as technology becomes more of a factor in how we do business. They’re not only worrying about keeping client data secure and network infrastructure up among its employees, but also trying to maintain business applications internally. Allocating some of those responsibilities from your IT staff …

Get started now. Exceptional service awaits.

Live Chat