HIPAA Compliance in 2022
Wednesday, 17 November 2021
Are you caught up on HIPAA compliance? Here at Partnered Solutions IT, we are dedicated to making sure you and your practice have all your bases covered when it comes to security compliance. If you want to learn more about HIPAA compliance standards and how to maintain compliance in the new year, read on or
No Comments
How To Use Zoom Safely: The Big Questions Answered
Wednesday, 08 April 2020
Partnered Solutions’ Chief Security Officer and Chief Operating Officer weigh in on the big questions surrounding the security of the video conferencing tool, Zoom. What makes Zoom such a popular choice over other programs like WebEx, Go To Meeting, or Blue Jeans? The main features of Zoom are ease of use and inter-operability with phones,
- Published in Secure
Tips for Safely Working Remotely
Tuesday, 24 March 2020
We here at Partnered Solutions IT, like many of you, are making adjustments to keep our own staff safe and healthy, working from home. Furthermore, we are also furiously working to keep our clients’ staff working as efficiently as possible. To that end, we have been implementing secure remote work access for our staff and
We are pleased to announce the opening of our Medford office!
Tuesday, 01 October 2019
Nov. 1 Update: The Partnered Solutions IT Medford Office is now open! The rumors are true…Partnered Solutions IT is expanding! From our headquarters almost 10 years ago in a 3-bedroom house, to our current 6,000 square-foot office space in downtown Eugene in 2017, we are ready to make another jump: a satellite office based in
HIPAA Compliance in 2019
Wednesday, 05 June 2019
The Health Insurance Portability and Accountability Act (HIPAA) sets the regulations for sensitive patient data protection for the healthcare industry. Companies that collect, store or use protected health information must have physical, network, and process security measures to keep data safe and be in compliance with HIPAA. Any entity that provides treatment, payment, or operations
The Importance of Vulnerability Scans
Thursday, 24 January 2019
What is a vulnerability scan, and why are they important for my business? Vulnerability scanning is an inspection of the potential points of exploit on a computer or network, to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan
- Published in Secure
Protect Yourself Against Ransomware
Thursday, 02 November 2017
Of all the different kinds of malware, none may be as nasty or annoying as ransomware. Ransomware is a type of malicious software that encrypts the files on your computer and forces you to pay a ransom to get them back. This malware can infect your computer through a variety of different methods including after
- Published in Secure
4 Ways to Protect Yourself After the Equifax Hack
Monday, 02 October 2017
Last month, Equifax, one of the three main credit bureaus, announced that it had been hacked between May and July of this year. As a result, personal information — including names, addresses, and social security numbers — was compromised for 143 million Americans — that’s nearly half of the U.S. adult population. Unlike other large
- Published in Secure
Security Basics: Password Best Practices
Monday, 07 August 2017
As a company that regularly performs security audits, we have spent a lot of time reviewing the security policies and practices of companies. Cybersecurity can be a very complicated topic which is why it’s surprising how often we find that one of the most basic security features isn’t properly used: passwords. Your company can spend
- Published in Secure
The Importance of Data Backups
Thursday, 06 July 2017
It is often said that the most valuable part of any computer is its data. Computer parts and components can be replaced, but data is gone forever once lost. While most large businesses understand the irreplaceable value of their data, the message can sometimes be lost on medium and small businesses. As a small business,
- Published in Secure
- 1
- 2