By:
DOUG KANNEY
December 1st, 2022
If you’ve ever tried to learn another language, you know that it’s incredibly difficult to just jump in—self-instruction can be difficult, disorganized, and overwhelming. It’s helpful, when setting off on this ambitious endeavor, to engage with a helpful tool that features a more structured approach with instruction on specific concepts. Let’s face it—if there’s something out there that can simplify complex ideas, it just makes sense to take advantage of it.
By:
Kellie Worley
November 9th, 2022
Consider sugar and salt—both are “spices” of a kind, and since they’re both often in the form of fine white grain, they look similar as well. So similar in fact, you might mistakenly switch one in for the other, setting yourself up for quite the surprise at first bite.
HIPAA | News | HIPAA Express
By:
Schellman
September 21st, 2022
TAMPA, FL: Schellman, a leading provider of attestation and compliance services, is pleased to announce the introduction of HIPAA Express, a new service offering aimed at reducing the risk of data breaches and ransomware attacks for large healthcare systems and regional healthcare providers.
By:
Kellie Worley
September 7th, 2022
Consider two people sharing an umbrella in the rain. They both have the same goal—to reach the car dry, without dropping any of the food they purchased and intend to share—but they each have different responsibilities on the mission: one is holding the umbrella and one has to hold the food.
By:
Kellie Worley
August 3rd, 2022
American everyman Bruce Barton once said: “Sometimes when I consider what tremendous consequences come from little things. I am tempted to think there are no little things.”
HIPAA | Cybersecurity | NIST
By:
DEBBIE ZALLER
June 10th, 2021
In January of 2021, the Department of Health and Human Services issued an amendment to the Health Information Technology for Economic Clinical Health (HITECH) Act regarding certain security practices of covered entities and business associates. They define adequate security practices as “standards, guidelines, best practices, methodologies, procedures, and processes developed under section 2(c)(15) of the National Institute of Standards and Technology Act, the approaches promulgated under section 405(d) of the Cybersecurity Act of 2015, and other programs and processes that address cybersecurity and that are developed, recognized, or promulgated through regulations under other statutory authorities.”
By:
DOUG KANNEY
July 25th, 2018
When you were growing up, did your mother keep a special collection of dinnerware? Maybe she had a particular cabinet she kept it in, or maybe it was just hidden away for special occasions, but the point is, your mom had her reasons and designated those plates as unique and worth further protection.