fbpx

Axeleos Technology Consulting

  • Home
  • About Us
  • Services
    • Cloud Consulting
    • Other Consulting
    • Managed Services
    • HIPAA Security Engagement
  • Blog
  • Contact Us
  • Privacy Policy
    • Cookie Policy (US)

HIPAA & the HITECH Act: 2 Acts; 1 Comprehensive Overview

axeleos January 20, 2022 Audit, Best Practices, Compliance, Governance, Security No Comments
The Health Information Technology for Economic and Clinical Health Act (HITECH) was signed into law in 2009, and amended the existing Health Insurance Portability and Accountability Act (HIPAA). The …
Continue  →

How to Identify and Eliminate Shadow IT

axeleos January 10, 2022 Operations, Best Practices, Governance No Comments
The term shadow IT refers to the phenomenon of business units and employees buying and using IT software and hardware without consulting or informing an organization’s central IT department.  …
Continue  →

Is Your Current MSP a Dumpster Fire? Here’s How to Know

axeleos January 9, 2022 Managed IT, Managed Services No Comments
No one ever wants to hear that their IT service provider may be doing more harm than good, but the fact of the matter is that incompetent or fraudulent …
Continue  →

The Criticality of Documentation in an IT Environment

axeleos December 20, 2021 Operational Efficiency, Best Practices, Operations No Comments
Documentation can be one of the most time-consuming aspects of running an IT department, but it’s also one of the most important. Documentation isn’t sexy, and no one wants …
Continue  →
  • ← Older posts
  • Newer posts →

Recent Posts

  • The 5 Most Common HIPAA Compliance Mistakes (And How to …
    3 days ago
  • Axeleos’ 2022 HIPAA Breaches Report
    1 month ago
  • 8 Critical Elements of Monitoring Your IT Infrastructure
    1 year ago

Connect with us

Axeleos Technology Consulting Copyright © 2023. All Rights Reserved.
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}