Learn about our response to COVID-19 Read Here

Security System Review with HIPAA

A small to medium practice service that improves your security posture

Vendor-selection-image

Vendor Selection

Vendors are the greatest source of breaches. Software, firmware, hardware, cloud services are on the table.

Staff-processes-and-devices-image

Staff Processes and Devices

Total usage policies of the office. Review education and details for security and HIPAA staff testing. Auditing and skills refresh. New software and hardware practice integration.

cloud-services-image

Cloud Services

Domain services, local servers and phone service. Cloud services exist in unexpected places. How to add new services safely.

cloud-services-image

Physical Space and Network

Document and understand the physical layout and design the processes to secure the office.

What We Look At

Network and System Security

Design a secure network, modify existing physical networks and network configuration. Monitor network activity and maintenance.

Device Security

Personal devices in the facility. Allowed devices, policies on BYODs.

Protection on Backups

Computer system setup, roles, software, passwords and MFA.

Process to Mitigate Ransomware

Understanding how it works. Level of prevention security. Simulation of ransomware lockup.

IT-supporting-VMA-image