CSO Blog has a short explanation of the HITECH Act and its implications for Healthcare providers and 3rd party partners.  The author also outlines some steps you can take to lower the risk of a data breach.  These include taking an inventory of all Protected Health Information (PHI) and using encryption on all storage devices.

Written by Kanguru — October 31, 2012

Today's Schedule

The Very Latest From Kanguru

Stay informed about the most up-to-date Kanguru products, services, special events and insights on IT technology from leaders in the secure data storage and duplication industry.

visit Kanguru News visit GuruBlog