866-337-9096 info@northstar-tg.com
  • Facebook
  • X
  • Instagram
  • Facebook
  • X
  • Instagram
NTG
  • Our Solutions
    • Information Security
    • Managed Services
    • Cloud Computing
    • HIPAA Compliance
    • Business Continuity
  • About Us
  • News and Reviews
  • Contact Us
Select Page
Security Audit for HIPAA Compliance – 5 steps

Security Audit for HIPAA Compliance – 5 steps

by kensatkunam | Mar 25, 2019 | Data Security and Protection, HIPAA, Security

The term “security audit” is often used synonymously with security risk assessment and risk analysis. A security audit for HIPAA compliance is when Health and Human Services (HHS) audits a covered entity or business associate to determine their level of compliance...
4 Types of Threats

4 Types of Threats

by kensatkunam | Jan 17, 2018 | Data Security and Protection, HIPAA, malware, Security, Technology, viruses

No matter how long you have been dealing with HIPAA there are probably some parts you just don’t get.  In the end, the HIPAA Security Rule exists to prevent bad stuff from happening.  So what is your risk of bad stuff happening?  That’s the purpose of one of the HIPAA...
  • Facebook
  • X
  • Instagram
Privacy Policy | Terms of Service | Privacy Settings