How to Use Ping What is Ping? Well, Ping is a legacy program that will send a short message to a network client, and then wait for a reply back from the client. It uses the old ICMP protocol. Will will help you solve your network problems by verifying connectivity across the network. Ping is the key to your solution. Almost any network endpoint will reply back to a ping, unless they have disabled it

Read more 1

HIPAA Horror Stories up to 2019 How Is Your HIPAA? These preventable HIPAA horror stories happened when a covered entity or a business associate was hit with either malware, external hackers or click happy insiders. No matter how it happened, confidentiality was breached, integrity was failed, and/or availability was compromised.  The result is the same in all cases. A large expenditure of resources and man-hours to recover data, clean up systems, restore functionality, and lots

Read more 4

What are HIPAA business associates? Are they held to the same healthcare privacy and security requirements as covered entities? Any individual or entity that performs functions or activities on behalf of a covered entity that requires the business associate to access PHI is considered a business associate, according to HHS. For example, your outside IT contractor that maintains the IS in your medical practice would be a business associate. Even the cloud service provider that

Read more 3