Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Perspective on the Proposed Health Infrastructure Security and Accountability Act

Perspective on the Proposed Health Infrastructure Security and Accountability Act

The Health Infrastructure Security and Accountability Act (HISAA) introduced in the U.S. Senate on September 26 is another good step forward in addressing key factors contributing to the healthcare sector’s deficiency in establishing and maintaining adequate cybersecurity controls and risk management programs. While there are many in the sector that are already implementing recognized standards, having mandated standards would help to make sure everyone is playing by the same rules.
Reproductive Health Privacy Rule Lawsuit May Signal Shift in Balance of Power

Reproductive Health Privacy Rule Lawsuit May Signal Shift in Balance of Power

On September 4, 2024, the State of Texas filed a lawsuit in the U.S. District Court, Northern District of Texas, against the U.S. Department of Health and Human Services (HHS), challenging both the HIPAA Final Rule to Support Reproductive Health Care Privacy (issued April 22, 2024) and the HIPAA Privacy Rule (issued December 28, 2000).
Understanding CMMC for Healthcare Organizations

Understanding CMMC for Healthcare Organizations

Healthcare organizations reported the highest number of ransomware attacks among the 16 industries classified as critical U.S. infrastructure last year, according to the 2023 FBI report on Internet crime.
Changing the Conversation about Cybersecurity in Healthcare

Changing the Conversation about Cybersecurity in Healthcare

Recent major cyberattacks highlight a crucial reality for healthcare: cybersecurity is now a critical factor impacting patient care and your organization’s ability to fulfill your mission.
Incident Response Plans: Your Key to Successfully Mitigate Breach Damage and Expenses

Incident Response Plans: Your Key to Successfully Mitigate Breach Damage and Expenses

A cyberattack impacts healthcare organizations far beyond the initial days of detection and containment. ...
Understanding Business Email Compromise and Common Social Engineering Tactics

Understanding Business Email Compromise and Common Social Engineering Tactics

Each day, threat actors send nearly 3.5 billion phishing emails. It takes just one click by one of your employees ...
What to Expect During an OCR Audit or Investigation and How to Prepare

What to Expect During an OCR Audit or Investigation and How to Prepare

This blog is based on part four of our 5-part webinar series, “HIPAA Audits Are On The Way—Are You Ready?” Access ...
Navigating Best Practices for HIPAA, 405(d) and CPGs

Navigating Best Practices for HIPAA, 405(d) and CPGs

This blog is based on part five of our 5-part webinar series, “HIPAA Audits Are On The Way—Are You Ready?” Access ...
Mitigating Common Active Directory Certificate Services Attacks For Healthcare Organizations

Mitigating Common Active Directory Certificate Services Attacks For Healthcare Organizations

Author: Fabian Crespo Introduction Active Directory Certificate Services (AD CS) is a critical component of ...
Compliance Matters: AI in Privacy and Compliance, Does It Work in Healthcare?

Compliance Matters: AI in Privacy and Compliance, Does It Work in Healthcare?

A newsletter turned blog by Clearwater VP of Privacy and Compliance Services, Andrew Mahler Welcome to ...
Compliance Matters: User Access Monitoring, 5 Things You May Not Be Thinking About

Compliance Matters: User Access Monitoring, 5 Things You May Not Be Thinking About

A newsletter turned blog by Clearwater VP of Privacy and Compliance Services, Andrew Mahler Welcome to ...
Ascension: What We Know & What You Can Do Now

Ascension: What We Know & What You Can Do Now

An update from Clearwater CEO Steve Cagle Last week, Clearwater posted a notice on LinkedIn informing our ...

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource