top of page


Enforce Access Controls for HIPAA Compliance (Step 6 of 17)
Access isn’t just a tech setting — it’s a HIPAA requirement. In Step 6 of our roadmap, we show you how to restrict PHI access by role, manage vendor permissions, and maintain airtight audit logs using tools built for small practices.

Patient Protect Editorial Team
May 42 min read


How to Secure Devices and Endpoints for HIPAA Compliance (Step 5 of 17)
Step 5: Harden Your Technology
In our 17-step HIPAA Compliance Series, this step focuses on securing every device, endpoint, and system that touches patient data — before threats get in.

Patient Protect Editorial Team
May 42 min read


Lock Down Physical Access to ePHI (Step 4 of 17)
Physical security is where HIPAA compliance begins.
In Step 4 of our 17-part roadmap, we cover how to lock down your facility, secure every device, and enforce encryption — so patient data doesn’t walk out the door. Plus, explore our free ePHI Data Flow Mapper to identify hidden risks in your physical environment.

Patient Protect Editorial Team
May 43 min read


Build Bulletproof HIPAA Policies — Appoint Officers, Train, and Enforce (Step 3 of 17)
Step 3 of our HIPAA Compliance Series shows you how to build bulletproof HIPAA policies by assigning officers, delivering annual training, and documenting workforce compliance — all required under HIPAA’s administrative safeguards.

Patient Protect Editorial Team
Apr 292 min read


Map Your PHI Risks — Master Risk Assessments and Threat Monitoring (Step 2 of 17)
Step 2 of our HIPAA Compliance Series covers how to map your PHI risks through dual risk assessments, continuous threat monitoring, and documented mitigation. This foundational step helps prevent breaches before they happen.

Patient Protect Editorial Team
Apr 293 min read


Know Your HIPAA Status — Covered Entity, Business Associate, Hybrid, or Vendor? (Step 1 of 17)
Before you can comply with HIPAA, you need to know your role. Step 1 of our 17-part compliance series walks you through how to determine whether you're a Covered Entity, Business Associate, Hybrid Entity, or Vendor — and why this decision is the foundation of your entire HIPAA strategy.

Patient Protect Editorial Team
Apr 293 min read
bottom of page