Client Login

User Identification Worksheet

Sunday, February 12, 2017 | BY: Giaspace

The User Identification Worksheet takes the list of users gathered by the Data Collector and lets you identify whether they are an employee or vendor. Users who should have been terminated and should have had their access terminated can also be identified. This is an effective tool to determine if unauthorized users have access to protected information. It also is a good indicator of the efforts the organization goes to so terminated employees and vendors have their access quickly disabled. Another benefit is that you can review the user list to identify generic logins, such as Nurse, Billing Office, etc., which are not allowed by HIPAA since each user is required to be uniquely identified. To save time the system allows you to enter default settings for all users and just change some as needed.

Recent Posts

Morning motivation

I start every morning with taking a picture of the Sunrise coming out of a garage.  This forces me for…

Friday, May 4, 2018

GiaSpace's Office is Moving in May 2018

Most of our Clients know the Story, but there is a positive after all. We are moving to a newly…

Tuesday, May 1, 2018

#DeleteFacebook

#DeleteFacebook  Nowadays it seems most people feel it is OK to voluntarily share their feelings about day to day happenings…

Tuesday, May 1, 2018

Our $20,230 mistake

Our $20,230 mistake. When signing a commercial lease, make sure you have a real estate attorney present to uncover the…

Friday, April 20, 2018

Today the FCC Voted 3/2 to remove regulation on the Monopoly of Internet providers in the USA...

Disclosure: This article is not political, nor picking political sides.  Today the FCC Voted 3/2 to remove regulation on the…

Thursday, December 14, 2017

Ransomware Shut Down a Whole North Carolina County

I saw that North Carolina decided not to pay the Ransomware to get their systems back online and will be…

Friday, December 8, 2017

Comcast Internet Outage Nationwide

As a private cloud provider, we need to make sure we limit downtime for our clients.  Today we received a…

Monday, November 6, 2017

KRACK WPA EXPLOIT

Mathy Vanhoef discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range…

Wednesday, October 18, 2017

There is Always Someone Cheaper

It’s true: There is always someone who will do it cheaper. The image above is one that had resonated with…

Wednesday, October 18, 2017

How to Prevent Ransomware And Discourage Data Kidnappers

If the thought of malware is scary, then the idea of ransomware is downright terrifying. A Trojan might steal sensitive…

Tuesday, October 10, 2017

Trusted By

Free Consultation 866-442-7723

Partners & Certifications