HIPAA Compliance in 2022
Wednesday, 17 November 2021
Are you caught up on HIPAA compliance? Here at Partnered Solutions IT, we are dedicated to making sure you and your practice have all your bases covered when it comes to security compliance. If you want to learn more about HIPAA compliance standards and how to maintain compliance in the new year, read on or
No Comments
Shopping for an IT Company: The Five Big Questions to Ask
Thursday, 12 November 2020
So you’re shopping for an IT company. Perhaps you have come to the realization you need one, or perhaps you’ve become frustrated with the one you’re working with; in any case, this may be unchartered territory. Some things are no-brainers; you want a team with a depth of skillsets, with different specialists in areas like
- Published in Manage
The basics of cloud-integrated edge computing
Friday, 10 April 2020
Here at Partnered Solutions, we are excited to be rolling out something that we think will revolutionize the way businesses handle IT for the rest of the decade. Yes, that’s right, the decade. We know how fast technology changes and this is a bold statement. So what are the current challenges that we’re addressing? Well,
- Published in Manage
How To Use Zoom Safely: The Big Questions Answered
Wednesday, 08 April 2020
Partnered Solutions’ Chief Security Officer and Chief Operating Officer weigh in on the big questions surrounding the security of the video conferencing tool, Zoom. What makes Zoom such a popular choice over other programs like WebEx, Go To Meeting, or Blue Jeans? The main features of Zoom are ease of use and inter-operability with phones,
- Published in Secure
Tips for Safely Working Remotely
Tuesday, 24 March 2020
We here at Partnered Solutions IT, like many of you, are making adjustments to keep our own staff safe and healthy, working from home. Furthermore, we are also furiously working to keep our clients’ staff working as efficiently as possible. To that end, we have been implementing secure remote work access for our staff and
Let’s talk about the HIPAA-potamus in the room; a Lunch and Learn
Thursday, 13 February 2020
Here at Partnered Solutions IT, we work with a number of medical offices and clinics that are beholden to HIPAA regulations. Keeping patient data safe is key for your practice, and making sure that happens is what we’re here for. At our Lunch and Learn we will be giving you the information needed to understand
- Published in Defend
We are pleased to announce the opening of our Medford office!
Tuesday, 01 October 2019
Nov. 1 Update: The Partnered Solutions IT Medford Office is now open! The rumors are true…Partnered Solutions IT is expanding! From our headquarters almost 10 years ago in a 3-bedroom house, to our current 6,000 square-foot office space in downtown Eugene in 2017, we are ready to make another jump: a satellite office based in
HIPAA Compliance in 2019
Wednesday, 05 June 2019
The Health Insurance Portability and Accountability Act (HIPAA) sets the regulations for sensitive patient data protection for the healthcare industry. Companies that collect, store or use protected health information must have physical, network, and process security measures to keep data safe and be in compliance with HIPAA. Any entity that provides treatment, payment, or operations
Accessibility & ADA Website Compliance
Thursday, 14 March 2019
The Americans with Disabilities Act was instituted in 1990 in an effort to improve protections against discrimination for people with disabilities. The ADA requires that organizations provide “reasonable accommodations” to employees with disabilities. While in 1990, this led to a revolution of the architecture of physical spaces (wheelchair accessible ramps, restrooms, and elevators), it has
- Published in Optimize
The Importance of Vulnerability Scans
Thursday, 24 January 2019
What is a vulnerability scan, and why are they important for my business? Vulnerability scanning is an inspection of the potential points of exploit on a computer or network, to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan
- Published in Secure