The Blog
Many years ago (before Apple's second surge) I would sit around and listen to technology minded individuals have very passionate arguments about which was better: Microsoft, Mac, or Linux. I was always perplexed ...
Continue Reading
As we come to our 7th and final article in the HITRUST Certification series, we come to the last question: Is HITRUST Certification really necessary?
Truthfully.
No.
"What?!? You just spent 6 other articles espousing what it ...
Continue Reading
If the first question when first considering HITRUST Certification is how much will this cost, the second question is how long will it take? It's a valid question. Any project you take on should ...
Continue Reading
I have mentioned before (and will continue to) that HITRUST Certification didn't secure the system itself; rather, it codified and proved out the existing security apparatus. However, one could argue that it made the ...
Continue Reading
"So how was the HITRUST Conference?" I asked the Network/Server Admin I tasked with the initial HITRUST requirement fact finding.
"They expressed a lot of doubt that we were going to be able to do ...
Continue Reading
Picking up on the theme from a few days ago, let's tell another story about a time I went head to head with an MCO and lost: HITRUST Certification.
You might be beginning ...
Continue Reading