Incident Response

What happens when you have a breach of PHI?

What happens when you suspect you may have a breach, your data has been leaked, stolen, or simply misplaced? Zekteck has experienced professionals that will assist you in resolving any data mishaps.

This service is included with any of our service packages with no additional charge. If you are using our intermediate or premium service packages, it is likely that you will pay little or no fines to Office of Civil Rights (an agency of HHS) because we worked together to ensure that you are HIPAA compliant.

If I’m paying for protection services, why should I worry about being breached?

No security is 100% secure. The mission and goal of Zekteck, and any other security company, is to reduce the attack surface, minimize risk, and mitigate any potential damages if a breach or attack was to take place. Zekteck is confident in our practices and offerings and will absorb the cost of corrective action in the time of a breach.

Contact UsGive us some information and we'll reach out as soon as possible.


Check In/Out Vendor




Add Asset

IT Asset
This is the user that will primarily use or be responsible for this asset.
e.g. "Joe's Laptop"
Does this asset store, receive, or transmit ePHI? *
ePHI stands for electronic protected health information.

Add Application

Applications
Does this application store PHI? *
Is the data encrypted? *

Add Vendor

Add Vendor
Address
Address
Address Line 1
Address Line 2
City
State
Zip Code

Add Employee

Please note: This will create an account for this employee in the user portal.

Add Employee
Only lower case letters (a-z) and numbers (0-9) are allowed.
Enter Email
Confirm Email
Enter Password
Confirm Password
Maximum upload size: 134.22MB
Please attach a .jpg, .png, .gif or .mpg image.

Ready to start your project? Contact us using the form below and we'll get back to you within 24 hours.