Anatomy IT Blog


HIPAA Tip: The Importance of a Risk Analysis

January 17, 2023

Many businesses and organizations today move at such a rapid pace they can be unknowingly putting themselves at risk for cyber attacks, data breaches, and other unwanted intrusions. Conducting a…

Read More

HIPAA Tip: HIPAA Organizations & Terms

January 10, 2023

Understanding the HIPAA Rule and HIPAA compliance starts with knowing the organizations that support HIPAA and basic terminology associated with HIPAA. Below is a list of important terms and organizations…

Read More

HIPAA Tip: Cybersecurity Awareness

December 20, 2022

How can you stay Cybersecurity aware? There are many ways to keep your organization on top of best practices when it comes to cybersecurity without breaking the bank or making…

Read More

HIPAA Tip: Steps to Ward off Ransomware Attacks

December 13, 2022

Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. This is done by encrypting files on the endpoint, threatening…

Read More

HIPAA Tip: Technical Safeguards

December 6, 2022

The Security Rule defines technical safeguards in § 164.304 as “the technology and the policy and procedures for its use that protect electronic protected health information and control access to…

Read More

HIPAA Tip: Business Associates

September 8, 2022

As defined by HHS, a Business Associate is a person or entity that performs certain functions or activities that involve the use or disclosure of Protected Health Information (PHI) on…

Read More


April 19, 2022

Myth #1: Emailing patient data or Protected Health Information (PHI) is covered by the HIPAA Rule but text messaging is not. This could not be further from the truth! Email…

Read More

HIPAA TIP: Recognized Security Practices

April 12, 2022

An amendment to the Health Information Technology for Economic and Clinical Health (HITECH) Act was signed into law on Jan. 5, 2021, directing U.S. Health and Human Services (HHS) to…

Read More

HIPAA TIP: Ransomware Resources

April 1, 2022

Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering these files and the systems they rely on unusable. Malicious actors then demand ransom in…

Read More