BlogHow to Protect ePHI in the Cloud8 months agoCloud computing offers many benefits for organizations, such as increased agility, productivity, and reduced costs. The issue is that any…
BlogThe Ultimate Guide to Electronic Protected Health Information (ePHI)8 months agoAccording to the Department of Health and Human Services (HHS), the U.S. didn’t have an accepted national standard for securing…
BlogThe Most Common Causes of ePHI Breaches8 months agoHIPAA isn’t new, but compliance continues to prove to be a challenge for healthcare organizations. Even meeting HIPAA requirements won’t…
BlogTausight joins MUSE!9 months agoIt is truly wonderful to be back in the MUSE community again! MUSE is a supportive community where members enjoy…
BlogWhat is ePHI? Definition & Examples of ePHI10 months agoCyber criminals can do so much with a snippet of patient information. In an age where patient healthcare data is…
BlogHow Can You Protect ePHI if You Aren’t Aware of It?10 months agoNot so long ago, the idea of sharing ePHI outside of your EMR or firewall was absurd. If you let…
BlogCloudWave and Tausight: Protecting PHI12 months agoLeaders from CloudWave and Tausight healthcare teams sat down to discuss the strategic partnership between the two organizations and how…
BlogA Breakthrough Patent1 year agoRecently, Tausight had a milestone moment that we are pleased to share! Our patent application for the architecture/approach used in…
BlogWhat’s in a name?1 year agoOur company, Tausight, provides real-time visibility into Protected Health Information (PHI) activity across all endpoints and servers, delivering situational PHI…