SlideShare a Scribd company logo
1 of 4
Download to read offline
ENCYPHR.COM
INFO@ENCYPHR.COM | 855-ENCYPHR (855-362-9747)
We’ve created a packaged solution specific to providers. Our solution helps keep patient records and sensitive
data secure. You can be confident that Encyphr’s solution is the best choice for your data protection needs.
FirewallWeb Security Cloud BackupHIPAA Policy Antivirus Encrypted Email
The Department of Health and Human Services (HHS) requires all Covered Health Care Providers
to comply with HIPAA and the Security Rule. These rules require addressable measures be taken in
regards to Privacy and Security. To comply with the Security Rule, covered entities must assess
security risks, implement solutions, and re-assess periodically to maintain protection and compliance.
With sensitive ePHI, personal records and customer privacy that all need protection, you can be
confident that Encyphr’s solution is the best choice for you. Our mission is to prevent these issues
using the latest technology and compliant solutions.
+PHYSICIANS +CHIROPRACTORS +PHYSICAL THERAPISTS
+DENTISTS +ORTHODONTISTS +HEALTHCARE BILLING
+HEALTHCARE LAWYERS +HEALTHCARE INSURANCE
Why should Healthcare Practices worry about security?
Healthcare providers may believe that if they are small, they will escape the attentions of digital
attacks. Yet, every day there are new attacks aimed specifically at small to mid-size organizations
for the very reason that they are low profile and less likely to have fully protected themselves. It is
vital to do as much as possible to protect sensitive health information or data. The consequences
of a successful cyber attack could be very serious, including loss of patient trust, violations of the
Health Insurance Portability and Accountability Act that can come with hefty fines.
The Code of Federal Regulations Title 45 Part 164.312 e(1) states,
that covered entities must implement technical security measures to
guard against unauthorized access to electronic Protected Health
Information (ePHI) that is being transmitted over an electronic
communications network.
WHY DO I NEED A FIREWALL?
NETWORK SECURITY
WHAT DOES A FIREWALL DO?
Firewalls are devices that control the flow of network traffic between networks that employ differing
security measures. By employing firewalls to control connectivity between internal and external internet
communications, an organization can prevent unauthorized access to its systems and resources. We ship
our firewall to your office, and partner with a local IT Provider to install it on your network. This, along
with our web security software, is one of the most advanced small business protection systems available
today.
At Encyphr, we utilize a web security solution that’s advanced, yet highly
cost-effective. Our cloud-based SecureAnywhere solution enables
offices to achieve the right level of security while maintaining productive
web access for employees. The service stops web abuse, minimizes
malware risks, and consistently enforces content and access policies that
optimize productive web usage. Utilizing this advanced software on each
of your devices, we create a dual-layer of protection when combined
with our physical firewall.
ANTIVIRUS
Malware and viral attacks don’t just wreak havoc on most computers,
they cause numerous issues for small business owners if security is
compromised. Conventional antivirus protection is struggling to
keep up with today’s threats and attacks. It slows down machines,
and is complex and resource-intensive. This is why Encyphr partners
with the best cloud-platform in the business to effectively stop
malware and zero-day threats at the moment of attack.
HIPAA POLICY + RISK ASSESSMENT
Your first step in implementing the Security Rule in regards to HIPAA compliancy is to create
a Manual to document policies and procedures. A Risk Assessment should be performed to
determine your offices' liability. We provide a policy manual and risk assessment document to
walk you through this process. You should ensure that these policies and procedures accurately
reflect the actual activities and practices exhibited by your business, staff, systems, and
business associates. Walking through this manual is your first step in identifying areas that you
need to work on, and documenting the procedures you are implementing.
Part 164.310(d)(1) of the Security Rule states that cove-
red entities must address how their data is backed up. An
offsite backup is required to safeguard data. Ensure that an
exact retrievable copy of the data is retained and protected
to protect the integrity of ePHI.
WHY DO I NEED DATA BACKUP?
DATA BACKUP
Keeping a copy of your data safe and off-site is a crucial step in protection. To
ensure data safety, we create a cloud-based, encrypted data backup of your main
server or file serving desktop computer. This ensures that important data is kept
safe in a third-party location for disaster recovery. We utilize compliant storage
servers with industry leading 256-Bit encryption during transmission, and while in
the cloud storage. This process is automated and monitored by our team.
COMPLIANT E-MAIL
What about sending private information through email? We provide an encrypted, complaint
email account for you to safely send those private documents to recipients. It works through
web-browsers and Outlook, and can be sent to anyone. We can utilize existing Gmail, Google
Apps and Yahoo accounts, or create one for you. This specific email address creates a layer of
safety to send important documents. Section 164.312(e)(1) of the Security Rule requires
covered entities to develop and implement transmission security policy and procedures. Our
encrypted email helps aid in that process by creating a tunnel of encryption for emails sent via
our compliant solution.
Top 10 Security Measures you can take for your Office
+ Use Strong Passwords and Change them regularly
+ Install and maintain Anti-Virus Software
+ Use a Firewall
+ Control access to protected health information
+ Control physical access
+ Limit network access
+ Plan for the unexpected
+ Document Policies and Procedures
+ Protect mobile devices that access your system
+ Establish a culture of security and training
The information contained in this guide is not intended to serve as legal advice nor should it substitute for legal counsel. The guide is not
exhaustive, and readers are encouraged to seek additional detailed technical guidance to supplement the information contained herein.

More Related Content

What's hot

Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | SecloreSeclore
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Traininghimalya sharma
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassA-lign
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNA Putra
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Securityanilchip
 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questionshimalya sharma
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 

What's hot (20)

Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access PassISO 27001 Certification: An All-Access Pass
ISO 27001 Certification: An All-Access Pass
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
It Policies
It PoliciesIt Policies
It Policies
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | Seclore
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Security
 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 

Viewers also liked

Mi autobiografia
Mi autobiografiaMi autobiografia
Mi autobiografialaura arias
 
Ecmg credit policy
Ecmg credit policyEcmg credit policy
Ecmg credit policyamitfinolex
 
La historia de time 2
La historia de time 2La historia de time 2
La historia de time 2jju122hjsjhhs
 
Final presentation Rev3
Final presentation Rev3Final presentation Rev3
Final presentation Rev3Ekkadit S.
 
KEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIK
KEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIKKEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIK
KEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIKDr. Suchismita Banik
 
CV_Ekkadit Siriwachirawat_6AUG2016_Ref
CV_Ekkadit Siriwachirawat_6AUG2016_RefCV_Ekkadit Siriwachirawat_6AUG2016_Ref
CV_Ekkadit Siriwachirawat_6AUG2016_RefEkkadit S.
 
Problems and solutions on atomic, nuclear, and particle physics kuo lim
Problems and solutions on atomic, nuclear, and particle physics   kuo limProblems and solutions on atomic, nuclear, and particle physics   kuo lim
Problems and solutions on atomic, nuclear, and particle physics kuo limsbsburbano burbano
 

Viewers also liked (11)

Mi autobiografia
Mi autobiografiaMi autobiografia
Mi autobiografia
 
Bipolar disorder
Bipolar disorderBipolar disorder
Bipolar disorder
 
Análisis técnico
Análisis técnicoAnálisis técnico
Análisis técnico
 
Ecmg credit policy
Ecmg credit policyEcmg credit policy
Ecmg credit policy
 
La historia de time 2
La historia de time 2La historia de time 2
La historia de time 2
 
Healthcare crisis in u.s.
Healthcare crisis in u.s.Healthcare crisis in u.s.
Healthcare crisis in u.s.
 
Final presentation Rev3
Final presentation Rev3Final presentation Rev3
Final presentation Rev3
 
Radiation
RadiationRadiation
Radiation
 
KEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIK
KEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIKKEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIK
KEY STAKEHOLDERS IN CLINICAL RESEARCH SUCHISMITA BANIK
 
CV_Ekkadit Siriwachirawat_6AUG2016_Ref
CV_Ekkadit Siriwachirawat_6AUG2016_RefCV_Ekkadit Siriwachirawat_6AUG2016_Ref
CV_Ekkadit Siriwachirawat_6AUG2016_Ref
 
Problems and solutions on atomic, nuclear, and particle physics kuo lim
Problems and solutions on atomic, nuclear, and particle physics   kuo limProblems and solutions on atomic, nuclear, and particle physics   kuo lim
Problems and solutions on atomic, nuclear, and particle physics kuo lim
 

Similar to ENCYPHR_Brochure_V2

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfForgeahead Solutions
 
Network security
Network securityNetwork security
Network securityROBERT S
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionSaurabh Sharma
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Centers
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
CTECH StackedDefense™
CTECH StackedDefense™CTECH StackedDefense™
CTECH StackedDefense™Alex Body
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breachhealthsoftware
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfNeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During CommunicationPECB
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 

Similar to ENCYPHR_Brochure_V2 (20)

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Data security
Data securityData security
Data security
 
Network security
Network securityNetwork security
Network security
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre Solution
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
CTECH StackedDefense™
CTECH StackedDefense™CTECH StackedDefense™
CTECH StackedDefense™
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breach
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 

ENCYPHR_Brochure_V2

  • 2. We’ve created a packaged solution specific to providers. Our solution helps keep patient records and sensitive data secure. You can be confident that Encyphr’s solution is the best choice for your data protection needs. FirewallWeb Security Cloud BackupHIPAA Policy Antivirus Encrypted Email The Department of Health and Human Services (HHS) requires all Covered Health Care Providers to comply with HIPAA and the Security Rule. These rules require addressable measures be taken in regards to Privacy and Security. To comply with the Security Rule, covered entities must assess security risks, implement solutions, and re-assess periodically to maintain protection and compliance. With sensitive ePHI, personal records and customer privacy that all need protection, you can be confident that Encyphr’s solution is the best choice for you. Our mission is to prevent these issues using the latest technology and compliant solutions. +PHYSICIANS +CHIROPRACTORS +PHYSICAL THERAPISTS +DENTISTS +ORTHODONTISTS +HEALTHCARE BILLING +HEALTHCARE LAWYERS +HEALTHCARE INSURANCE Why should Healthcare Practices worry about security? Healthcare providers may believe that if they are small, they will escape the attentions of digital attacks. Yet, every day there are new attacks aimed specifically at small to mid-size organizations for the very reason that they are low profile and less likely to have fully protected themselves. It is vital to do as much as possible to protect sensitive health information or data. The consequences of a successful cyber attack could be very serious, including loss of patient trust, violations of the Health Insurance Portability and Accountability Act that can come with hefty fines.
  • 3. The Code of Federal Regulations Title 45 Part 164.312 e(1) states, that covered entities must implement technical security measures to guard against unauthorized access to electronic Protected Health Information (ePHI) that is being transmitted over an electronic communications network. WHY DO I NEED A FIREWALL? NETWORK SECURITY WHAT DOES A FIREWALL DO? Firewalls are devices that control the flow of network traffic between networks that employ differing security measures. By employing firewalls to control connectivity between internal and external internet communications, an organization can prevent unauthorized access to its systems and resources. We ship our firewall to your office, and partner with a local IT Provider to install it on your network. This, along with our web security software, is one of the most advanced small business protection systems available today. At Encyphr, we utilize a web security solution that’s advanced, yet highly cost-effective. Our cloud-based SecureAnywhere solution enables offices to achieve the right level of security while maintaining productive web access for employees. The service stops web abuse, minimizes malware risks, and consistently enforces content and access policies that optimize productive web usage. Utilizing this advanced software on each of your devices, we create a dual-layer of protection when combined with our physical firewall. ANTIVIRUS Malware and viral attacks don’t just wreak havoc on most computers, they cause numerous issues for small business owners if security is compromised. Conventional antivirus protection is struggling to keep up with today’s threats and attacks. It slows down machines, and is complex and resource-intensive. This is why Encyphr partners with the best cloud-platform in the business to effectively stop malware and zero-day threats at the moment of attack. HIPAA POLICY + RISK ASSESSMENT Your first step in implementing the Security Rule in regards to HIPAA compliancy is to create a Manual to document policies and procedures. A Risk Assessment should be performed to determine your offices' liability. We provide a policy manual and risk assessment document to walk you through this process. You should ensure that these policies and procedures accurately reflect the actual activities and practices exhibited by your business, staff, systems, and business associates. Walking through this manual is your first step in identifying areas that you need to work on, and documenting the procedures you are implementing.
  • 4. Part 164.310(d)(1) of the Security Rule states that cove- red entities must address how their data is backed up. An offsite backup is required to safeguard data. Ensure that an exact retrievable copy of the data is retained and protected to protect the integrity of ePHI. WHY DO I NEED DATA BACKUP? DATA BACKUP Keeping a copy of your data safe and off-site is a crucial step in protection. To ensure data safety, we create a cloud-based, encrypted data backup of your main server or file serving desktop computer. This ensures that important data is kept safe in a third-party location for disaster recovery. We utilize compliant storage servers with industry leading 256-Bit encryption during transmission, and while in the cloud storage. This process is automated and monitored by our team. COMPLIANT E-MAIL What about sending private information through email? We provide an encrypted, complaint email account for you to safely send those private documents to recipients. It works through web-browsers and Outlook, and can be sent to anyone. We can utilize existing Gmail, Google Apps and Yahoo accounts, or create one for you. This specific email address creates a layer of safety to send important documents. Section 164.312(e)(1) of the Security Rule requires covered entities to develop and implement transmission security policy and procedures. Our encrypted email helps aid in that process by creating a tunnel of encryption for emails sent via our compliant solution. Top 10 Security Measures you can take for your Office + Use Strong Passwords and Change them regularly + Install and maintain Anti-Virus Software + Use a Firewall + Control access to protected health information + Control physical access + Limit network access + Plan for the unexpected + Document Policies and Procedures + Protect mobile devices that access your system + Establish a culture of security and training The information contained in this guide is not intended to serve as legal advice nor should it substitute for legal counsel. The guide is not exhaustive, and readers are encouraged to seek additional detailed technical guidance to supplement the information contained herein.