Monthly Archives: August 2014

Site Notice

We just migrated this website to a WordPress Multisite platform to be managed easier.  Unfortunately we lost all the historical social activity on the site – Facebook likes, tweets, google+, etc. – So if you have liked or shared something from this site before, please come back and share again. It will be much appreciated.

Read More

Adding Speed to your Website with .htaccess

Website Speed

Website speed plays a major part in ranking your website higher than the competition.  The faster your website’s loading time the more search engines will like it. A good FREE tool to test your website speed is the Google PageSpeed Insights among many others. If you are running on an Apache server you can speed […]

Read More

Hospital Employee Indicted for Criminal HIPAA Violations

HIPAA Criminal Violation

A former hospital employee in East Texas has been indicated by federal prosecutors for criminal violations of the Health Insurance Portability and Accountability Act (“HIPAA”).  Allegedly the former employee obtained PHI with the intent to use the information for personal gain between December 1, 2012 through January 14, 2013. He has been indicated on charges […]

Read More

What is Risk Analysis (Section 19 of the HIPAA Security Rule)

HIPAA Risk Analysis

Risk Assessment otherwise called Risk Analysis is a Required part of the HIPAA Security Rule 164.308(a)(1). To ensure compliance, health care providers, medical offices (Covered Entity), business associates, or any other entity that receives, transforms, or stores Electronic Protected Health Records (ePHI)  are required to perform a Risk Analysis at least once a year or […]

Read More

5 Things You Should Do Right Now To Protect Yourself from Hackers

Online malicious hacking activities are on the rise. The latest news about Russian hackers stealing 1.2 billion usernames and passwords is a testament to how vulnerable we could be. Online activities is part of our daily life including banking, emails, social networking, and shopping. Having your password stolen could be very costly on all levels. […]

Read More

Credit Card Authorization Override Trick

Someone allegedly has found a new clever way to buy products with fake or bad credit cards. He visited various Apple stores to purchase products. At the time of payment he provides four different debit/credit cards belonging to accounts that have been closed by the financial institutions. When the cards are declined by the Apple […]

Read More