Yesterday we published a detailed post on Call Tracking, what it is, and how it can provide valuable business intelligence. As health care practices emerge from the COVID-19 slowdown of elective procedures, many are increasing their marketing efforts. Since call tracking is often a component of these efforts, we thought it would be essential to […]
Blog Posts About Security and Compliance
How To Select a HIPAA Compliant Technology Partner
COVID-19, shelter-in-place, and social distancing has imposed a number of changes in business culture and operations, none more than in healthcare companies. As these organizations are shifting strategies from integrating new telehealth offerings to work-at-home support agents, HIPAA compliance is becoming more and more complicated. For example, are your newly remote revenue control agents who […]
How To Choose a PCI DSS QSA Auditor
Don’t choose the lowest bidder when you are seeking the best QSA (Qualified Security Assessor) to do your onsite PCI DSS audit. We’re not trying to inflate the costs of validating your compliance program but instead intended to LOWER the total cost of the PCI onsite audit. We often have ongoing conversations on what to […]
PCI DSS Compliance Has Been Declining For Three Years
Compliance with industry-standard payment-card security standards is declining amongst service providers and merchants. According to Verizon’s latest Payment Security Report, barely more than one-third of companies were fully compliant with PCI DSS standards in 2019. And to make matters worse, compliance has been dropping for the past three years, with a rapid decline from 2017. […]
Here’s What You Need To Know About HIPAA Compliance
In short, the Health Insurance Portability and Accountability Act, or HIPAA, is a federal law that was enacted to keep health care information private and confidential. The rule focuses on limiting the use and disclosure of personal health information.
Toll Fraud Costs Businesses Billions
A company wouldn’t run a computer network without some sort of virus protection or firewall. Yet even with these safeguards in place, they still can leave an access point for malicious hackers. That would be their VoIP phone line.