Resources

Datasheet

Ransomware Attack is HIPAA Breach: 5 Steps To Protect Your PHI

5 Steps To Protect Your PHI From RansomwareWith the rise in ransomware attacks targeting healthcare organizations, the U.S. Department of Health and Human Services (HHS) has issued a guidance document that explains the basics of ransomware, what organizations should do in the event of data breach, and how to contain the attack from stealing sensitive patient data.The Ransomware and HIPAA...
On-Demand Webinar

How a Renowned Healthcare Institution Shares Patient Data in the Cloud - Securely

A world renowned healthcare institution envisioned using the cloud to deliver better patient care. Their goal was to use the cloud to dramatically improve the sharing of patient information across their multiple campuses and with their associates around the world. But they needed to figure out how to accomplish this and remain HIPAA compliant.Join Mark Menke, Principal Architect at Digital...
Blog

What is HIPAA Compliance?

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.