Tag Archives: PHI

2-Factor Authentication: A shield for PHI against hackers

PHI 2 Factor Authentication

Protected Health Information (PHI) is hacked, stolen or misused with regularity and more than need be.  Sometimes you can’t help HIPAA breaches, but often times there are measures you can and should take to protect and secure PHI data.   All health care agencies must abide by the HIPPA and HITECH laws, but it is […]

Read More