Stay Compliant

Having written policies and procedures of your practice’s security compliance is a requirement of HIPAA. The Security First Aid Kit provides all of the written policies and procedures you need as well as tools to assist in implementing the policies and procedures to keep your practice secure.

What does the Security First Aid Kit include?

Policy and Compliance
  • How are users allowed to use their personal devices for work
  • What are the policies around working from home
  • How PHI is handled at rest and in transit
  • How PHI is managed in its different forms (physical or digital)
  • How are external storage devices managed
  • Security training policy
Business Continuity and Disaster Recovery
  • Business Continuity Procedures
    • How to keep business going in times where business cannot be performed normally
    • What to do in a power outage
    • How to use paper back ups and manual process
    • Get access to paper forms and back up documents
    • What to do in a network outage
    • Information backup and storage procedures and policies
  • Disaster Recovery Procedures
    • How to recover from any period of time where business couldn’t operate normally
    • Information and data recovery procedures
    • Manage recovery and back up locations
    • Performing lessons learned
  • Emergency Response Plan
    • How to respond during times of emergency or when business cannot operate normally (the way to business continuity)
    • People safety plans
      • evacuations
      • safety equipment
      • supplies
    • Manage emergency response roles
    • Logging tools to assist in lessons learned
Email Security Policy and Procedures
  • Tips and tricks for identifying phishing scams
  • Report suspicious emails
Malware and Malicious Attacks
  • Tips and tricks for identifying good and bad pop ups
  • Trouble shooting system issues versus potential malware attacks
  • Request assistance with suspicious activity or incident response needs
Network Security Policies and Procedures
  • Manage and track device information to have a complete view of the network
  • View a full map of your network and how information is flowing
  • Troubleshooting procedures for network devices
  • Policies pertaining to network access
Contact UsGive us some information and we'll reach out as soon as possible.

Check In/Out Vendor

Add Asset

IT Asset
This is the user that will primarily use or be responsible for this asset.
e.g. "Joe's Laptop"
Does this asset store, receive, or transmit ePHI? *
ePHI stands for electronic protected health information.

Add Application

Does this application store PHI? *
Is the data encrypted? *

Add Vendor

Add Vendor
Address Line 1
Address Line 2
Zip Code

Add Employee

Please note: This will create an account for this employee in the user portal.

Add Employee
Only lower case letters (a-z) and numbers (0-9) are allowed.
Enter Email
Confirm Email
Enter Password
Confirm Password
Maximum upload size: 134.22MB
Please attach a .jpg, .png, .gif or .mpg image.

Ready to start your project? Contact us using the form below and we'll get back to you within 24 hours.