The Digital Danger: Why Healthcare is a Prime Target For Cybercriminals

Jennifer Noto Healthcare Leave a Comment

The adoption of new technologies in healthcare has made the industry a prime target for cybercriminals. Mainstream media outlets spend a good amount of time discussing the cyber vulnerabilities of small businesses and individuals but largely ignore the looming threat hackers present to healthcare organizations—and that’s a mistake. The healthcare sector has been affected by more data breaches than any …

The Future of Healthcare is In Collaboration—Here Are 4 Reasons Why

Jennifer Noto Healthcare Leave a Comment

Collaboration technologies improve the experience for both patients and healthcare providers. Digital transformation is an often-discussed topic in tech circles but the conversation is rarely focused on healthcare. Digital technologies, specifically those related to collaboration, are helping to transform and improve the experience for both patients and healthcare providers nationwide. The future of healthcare is in collaboration; keep reading to …

Carolinas IT Successfully Completes the SOC 2 Type 1 Examination

Chris Walters Healthcare, News, Security Leave a Comment

RALEIGH, NC – December 15, 2015 – Carolinas IT, the region’s leading provider of private cloud computing and managed IT services, is pleased to announce it has successfully completed the Service Organization Control (SOC) 2 Type 1 examination for Cloud Services with selected SOC 2 principles of security and availability. The examination was completed on November 15, 2015 by the independent CPA …

Benefits of Outsourced Security Risk Assessments

Chris Walters Healthcare Leave a Comment

More than just required by HIPAA, a thorough Security Risk Assessment (SRA) is essential for the security of information in your physician practice or organization. Healthcare IT professionals face the risks of an expensive, trust-diminishing breach of protected health information (PHI) in addition to steep fines associated with non-compliance and a failed security audit. SRAs demand extensive time and resources …