Let’s talk about the HIPAA-potamus in the room; a Lunch and Learn
Thursday, 13 February 2020
Here at Partnered Solutions IT, we work with a number of medical offices and clinics that are beholden to HIPAA regulations. Keeping patient data safe is key for your practice, and making sure that happens is what we’re here for. At our Lunch and Learn we will be giving you the information needed to understand
- Published in Defend
No Comments
We are pleased to announce the opening of our Medford office!
Tuesday, 01 October 2019
Nov. 1 Update: The Partnered Solutions IT Medford Office is now open! The rumors are true…Partnered Solutions IT is expanding! From our headquarters almost 10 years ago in a 3-bedroom house, to our current 6,000 square-foot office space in downtown Eugene in 2017, we are ready to make another jump: a satellite office based in
HIPAA Compliance in 2019
Wednesday, 05 June 2019
The Health Insurance Portability and Accountability Act (HIPAA) sets the regulations for sensitive patient data protection for the healthcare industry. Companies that collect, store or use protected health information must have physical, network, and process security measures to keep data safe and be in compliance with HIPAA. Any entity that provides treatment, payment, or operations
Accessibility & ADA Website Compliance
Thursday, 14 March 2019
The Americans with Disabilities Act was instituted in 1990 in an effort to improve protections against discrimination for people with disabilities. The ADA requires that organizations provide “reasonable accommodations” to employees with disabilities. While in 1990, this led to a revolution of the architecture of physical spaces (wheelchair accessible ramps, restrooms, and elevators), it has
- Published in Optimize
The Importance of Vulnerability Scans
Thursday, 24 January 2019
What is a vulnerability scan, and why are they important for my business? Vulnerability scanning is an inspection of the potential points of exploit on a computer or network, to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan
- Published in Secure
Business After Hours
Tuesday, 05 June 2018
Join Partnered Solutions IT as we host this month’s Business After Hours! When Thursday, June 21, 2018 5:00 pm – 7:00 pm Where Our Office! 58 W 11th Ave. Eugene, OR 97401 Festivities Games: Cornhole, ladder ball, and MultiVRse Virtual Reality Gaming. Prizes: Basket/gift certificate raffle. Live Music: Played by Charley Snellings. Sustenance Catering provided by Tradewinds at Jiffy.
- Published in Manage
Protect Yourself Against Ransomware
Thursday, 02 November 2017
Of all the different kinds of malware, none may be as nasty or annoying as ransomware. Ransomware is a type of malicious software that encrypts the files on your computer and forces you to pay a ransom to get them back. This malware can infect your computer through a variety of different methods including after
- Published in Secure
4 Ways to Protect Yourself After the Equifax Hack
Monday, 02 October 2017
Last month, Equifax, one of the three main credit bureaus, announced that it had been hacked between May and July of this year. As a result, personal information — including names, addresses, and social security numbers — was compromised for 143 million Americans — that’s nearly half of the U.S. adult population. Unlike other large
- Published in Secure
Why Your Small Business Needs a Managed Service Provider
Wednesday, 06 September 2017
If you run a small business, you understand how difficult it is to make sure that all of your bases are covered. Often, small business owners must make tough decisions based on the resources they have available to them. This is often the case when it comes to building, optimizing, supporting, and defending your network
- Published in Manage
Security Basics: Password Best Practices
Monday, 07 August 2017
As a company that regularly performs security audits, we have spent a lot of time reviewing the security policies and practices of companies. Cybersecurity can be a very complicated topic which is why it’s surprising how often we find that one of the most basic security features isn’t properly used: passwords. Your company can spend
- Published in Secure