by Adam Nielson | Jun 7, 2022 | Blog
While attackers have long had their eyes on healthcare organizations for the sensitive personal health information (PHI) in their coffers, the increased adoption of telehealth services and remote teams have added incentive to seek out evolving security weaknesses....
by Henry Sprafkin | Jun 7, 2021 | Blog
The first two installments in this series focused on risk management and risk-based control selection. While not a requirement, it is best to build the security control library based on an established control framework. There are over 200 different risk management,...
by Steve Cagle | Apr 23, 2020 | Blog
In response to increasing regulatory and customer pressure to protect patient data, business associates are outsourcing their HIPAA compliance and cybersecurity programs to third-party healthcare privacy and security firms. This managed service approach results in a...
by admin | Nov 26, 2019 | On-Demand Webinars
THIS PRESENTATION IS A RECORDING OF A LIVE WEBINAR GIVEN ON 11/26/2019. Overview In the wake of so many vendor-related data breaches, health systems have raised the bar on HIPAA Compliance and Cyber Risk Management requirements of their vendors. For any business that...
by admin | Jan 31, 2019 | On-Demand Webinars
THIS PRESENTATION IS A RECORDING OF A LIVE WEBINAR GIVEN ON 01/31/19. This webinar explored the challenges of managing vendor cyber risk from both covered entity and vendor perspectives. HIPAA compliance requirements was discussed along with cyber risk management,...