Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 
 

Faxing In The Healthcare Industry – HIPAA Compliance

http://www.youtube.com/watch?v=CwThd-_vWvA

The security provision of HIPAA demands that healthcare providers take reasonable care to protect the confidentiality of protected healthcare information (also known as PHI).

Traditional fax machines don’t qualify, making network fax servers the only way to safely and securely transmit confidential patient data.

And that isn’t the only advantage of using a fax server in your healthcare business! Watch our quick video to find out more about faxing in the healthcare industry.

Video Categories: Videos

 

 

 

PCI DSS: Twelve IT requirements

on May 21, 2012

The Payment Card Industry Data Security Standards — or PCI DSS — cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS’s 12 key requirements in this quick overview; together they make up the …

Read the Full Story
1

HIPAA – IT compliance

on May 9, 2012

HIPAA is the Health Insurance Portability and Accountability Act that regulates the creation and handling of personal healthcare information. If you create or handle personal healthcare information, that is data that can be tracked back to an individual, then you …

Read the Full Story
2

Five essential tips to ensure corporate email compliance

on May 2, 2012

The world of email compliance is a complicated one. Not only do you have to cope with an alphabet soup of acronyms describing regulatory bodies, you also have to decipher reams of compliance requirements for your industry. In an effort …

Read the Full Story
4

The Top 5 Online Security Traps and how to Avoid Them

on April 25, 2012

It only takes one malicious link, infected download or data breach to compromise the security of your business. The first level of defense against these threats is employee education. To help you get started, here’s some advice for you to …

Read the Full Story
3

The Perils of Public Wireless Networks

on April 18, 2012

We access Wi-Fi hotspots both for work and for play — but how much thought do we give security? Are administrators — and their users — fully aware of the risks of surfing openly on a public wireless network? This …

Read the Full Story
3

Why you Need to run a Vulnerability Assessment

on April 11, 2012

The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they …

Read the Full Story
1

The Hidden Threats Behind Web Banners

on April 5, 2012

What is ‘malvertising’ and why is it dangerous? Watch this video to learn more about the perils posed by malicious web banners and what you can do to protect your network and your users against their harmful payload. http://www.youtube.com/watch?v=pao3dJKgGWA

Read the Full Story
2

How to Dispose of Confidential Data

on March 28, 2012

Companies spend lots of money on protecting their networks and yet, one aspect of data security is surprisingly overlooked – the disposal of old hardware, especially hard disks. Learn how to effectively tackle this issue in this video. http://www.youtube.com/watch?v=Yop3xDWx8ag

Read the Full Story
2

10 Free Tools for Network Administrators

on March 21, 2012

Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video’s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size …

Read the Full Story
3

Are you being sniffed?

on March 14, 2012

Packet sniffing is the hacker’s technology of choice to probe networks. In this video, we explain how you can be watched or ‘sniffed’ and, more importantly, how to protect your network against this security threat. http://www.youtube.com/watch?v=gbSJT6a0JVo

Read the Full Story
3