Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

How Physician Groups Can Overcome Common Cybersecurity and HIPAA Compliance Challenges

How Physician Groups Can Overcome Common Cybersecurity and HIPAA Compliance Challenges

Introduction Across the healthcare industry, large physician groups are becoming increasingly common, as ...
HIPAA Primer Requirements for Business Associates

HIPAA Primer Requirements for Business Associates

Protecting PHI: The Buck Stops Here for BAs Introduction With both increased OCR investigations and ...
Building Frameworks to Manage Healthcare Data Within the Changing U.S. Privacy Landscape

Building Frameworks to Manage Healthcare Data Within the Changing U.S. Privacy Landscape

Introduction As the world is more connected to digital life, state and federal agencies are issuing a growing ...
Driving Compliance Efficiency Through Enterprise Cyber Risk Management (Copyright 2021 Compliance Today)

Driving Compliance Efficiency Through Enterprise Cyber Risk Management (Copyright 2021 Compliance Today)

By Bob Chaput, CISSP, HCISPP, CRISC, CIPP/US C/EH Founder & Executive Chairman Introduction The business ...
Risky Business: How to Conduct a NIST-based Risk Analysis to Comply with the HIPAA Security Rule

Risky Business: How to Conduct a NIST-based Risk Analysis to Comply with the HIPAA Security Rule

In addition to being a HIPAA Security Rule requirement, conducting regular risk analyses is a fundamental business ...
Build A Culture of Compliance Through Principle-Based Policy Governance

Build A Culture of Compliance Through Principle-Based Policy Governance

Introduction Organizations of all sizes struggle with embedding policies and procedures successfully into their ...
New Standardized Health Care Application Programming Interfaces (APIs)

New Standardized Health Care Application Programming Interfaces (APIs)

Will the Hoped-For Rewards from Improved Interoperability and Reduced Information Blocking Outweigh the Potential ...
How to Make System Activity Reviews an Effective Part of Your Security Program

How to Make System Activity Reviews an Effective Part of Your Security Program

Introduction As a covered entity or business associate, the Health Insurance Portability and Accountability Act ...
Securing Healthcare’s Digital Transformation for Providers, Vendors, and Patients

Securing Healthcare’s Digital Transformation for Providers, Vendors, and Patients

At least 44% of healthcare organizations have experienced a breach in the past 12 months, with 74% of respondents attributing the breaches to giving too much access privileges to third-parties.
Why Resilience is Not Enough for Today’s Healthcare Cybersecurity and Privacy Programs

Why Resilience is Not Enough for Today’s Healthcare Cybersecurity and Privacy Programs

We now have examples of cyberattacks that have directly impacted patient safety and even include allegations of attacks resulting in patient deaths.
Understanding Business Processes and Critical Capabilities: A Closer Look at Business Impact Analysis with U.S. Anesthesia Partners

Understanding Business Processes and Critical Capabilities: A Closer Look at Business Impact Analysis with U.S. Anesthesia Partners

COVID-19 changed the world as most of us know it, both personally and professionally. And few industries may have felt the breadth of its impact as those in healthcare.
Making Every Month Cybersecurity Awareness Month

Making Every Month Cybersecurity Awareness Month

October’s Cybersecurity Awareness Month is a great time to promote cyber hygiene best practices throughout your organization.

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource