anatomy-blogs-hero-612feb441d9ef
/
Read About The Latest

Happening in the Industry

blogs
2022-05-13

How Healthcare IT Services Power Peace of Mind

IT infrastructure is complicated in the modern world. Though you need digital systems and communications, managing those systems and keeping them secure can be a real sticking point when looking at future strategies. Often, IT departments are stretched thin or have gaps in skills and expertise, which can lead to inefficiency and stagnated growth as […]

2022-05-06

ANATOMY_IT. Is Selected As a Top 15 Healthcare IT Services Provider

ANATOMY_IT. has been ranked no. 15 on ChannelE2E’s Top 100 Vertical Market MSP list as a leading healthcare IT services provider. Learn more.

2022-05-06

Why ANATOMY_IT. Is the Best-Equipped Healthcare IT MSP in the Industry

Healthcare organizations have always had unique needs – and many of the challenges of operating a healthcare business were exacerbated and further complicated during the COVID-19 pandemic.  For many healthcare organizations, internal IT teams – and even incumbent managed service providers – simply don’t have the expertise or resources to ensure technology is optimized, patient data […]

2022-04-19

HIPAA Tip: HIPAA Myths

Myth #1: Emailing patient data or Protected Health Information (PHI) is covered by the HIPAA Rule but text messaging is not. This could not be further from the truth! Email and text messages are both considered forms of electronic communications under HIPAA and must comply with the HIPAA Privacy and Security Rules.  Myth #2: Healthcare […]

2022-04-12

HIPAA TIP: Recognized Security Practices

An amendment to the Health Information Technology for Economic and Clinical Health (HITECH) Act was signed into law on Jan. 5, 2021, directing U.S. Health and Human Services (HHS) to consider “recognized security practices” in investigations related to HIPAA (Health Insurance Portability and Accountability Act) (HR 7898, Pub. L. 116-231).  If a Covered Entity or Business […]

2022-04-01

HIPAA TIP: Ransomware Resources

Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering these files and the systems they rely on unusable. Malicious actors then demand ransom in exchange for decryption of the files.  Stop Ransomware.gov was created to educate and offer resources to tackle ransomware more effectively. The following resources were designed […]

2022-03-22

HIPAA TIP: Minimum Necessary Requirement

The “minimum necessary” standard of the HIPAA Privacy Rule is derived from confidentiality codes and practices in common use today. It is based on “sound current practice” that Protected Health Information (PHI) should not be used or disclosed when it is not necessary to satisfy a particular purpose or carry out a function. The minimum […]

2022-03-15

HIPAA TIP: Tabletop Disaster Recovery/Business Continuity Tests

A tabletop test is a meeting to review and discuss a simulated emergency situation and concrete plans to manage the fine details of the occurrence, and aftermath of a natural or human-made disaster.  Tabletop testing gives insights into how well a disaster recovery, business continuity plan, or incident response plan is set to help respond […]

2022-03-08

HIPAA TIP: The Dos and Don’ts of HIPAA Training

The HIPAA Privacy Rule and the HIPAA Security Rule have training requirements for Covered Entities, Business Associates, Business Associate Subcontractors, and members of their workforce.  These can be found in 45 CFR § 164.530(b)(1) and 45 CFR § 164.308(a)(5), respectively. Any doctors, nurses, staff and employees who come into contact with Protected Health Information (PHI) […]

2022-03-01

HIPAA TIP: Sensitive Data and the Cloud Shared Responsibility Model

First and foremost, do you know where all of your organization’s Protected Health Information (PHI), electronic Protected Health Information (ePHI) and Personally Identifiable Information (PII) is stored? As a Covered Entity or Business Associate it is your responsibility to put in place security measures to safely store all PHI and ePHI per the HIPAA Security […]