Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
Firewall Configuration for Healthcare Networks: HIPAA‑Compliant Best Practices
Effective firewall design is central to protected health information (PHI) protection and to meet...
HIPAA Compliance for Compounding Pharmacies: Requirements, Best Practices, and Checklist
HIPAA Compliance Requirements for Compounding Pharmacies. As a pharmacy, your compounding operat...
Healthcare Cloud Provider Cybersecurity Checklist: HIPAA, HITRUST & SOC 2 Requirements
If you deliver or host healthcare solutions in the cloud, you need a practical, testable approach...
HIPAA Compliance Implementation Plan: Step-by-Step Guide and Checklist
A practical HIPAA compliance implementation plan turns policy into day‑to‑day behaviors that prot...
Preventing Misconfigured Databases in Healthcare: Best Practices to Protect Patient Data
Misconfigured databases are a leading cause of Protected Health Information (PHI) Exposure in hea...
The CTO’s Role in HIPAA Compliance for Healthcare Organizations
The CTO’s Role in HIPAA Compliance for Healthcare Organizations centers on translating regulatory...
OIG Exclusion Screening for Dental Offices: Requirements, How to Run Checks, and Best Practices
OIG Exclusion Authority Overview. The U.S. Department of Health and Human Services Office of Ins...
Physical Security Best Practices for Rehabilitation Facilities: A Practical Checklist and Guide
Strong, patient-centered security keeps your facility safe, compliant, and operationally resilien...
OIG Exclusion Screening in Texas: LEIE & HHSC Requirements and How to Run Checks
Overview of OIG Exclusion Screening. OIG exclusion screening protects Federal health care progra...
Eventbrite HIPAA Compliance: Does It Sign a BAA?
Overview of HIPAA Compliance. If you host healthcare-related events, HIPAA applies whenever you ...
HIPAA Compliance Checklist for Shared Medical Offices
Shared medical offices introduce unique privacy and security challenges because multiple provider...
Healthcare Encryption: The Complete Guide to HIPAA-Compliant Data Security and Patient Privacy
HIPAA Encryption Requirements. What the HIPAA Security Rule requires. The HIPAA Security Rule s...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security