Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Penetration Testers Offer Real-World Advice About Threats, Securing Your Healthcare Organization

Penetration Testers Offer Real-World Advice About Threats, Securing Your Healthcare Organization

Today’s modern threat landscape is constantly evolving. Determined, opportunistic, and well-resourced threat actors continue to develop tools, tactics and techniques aimed at gaining access to systems, stealing data, and/or installing ransomware.
Business Associate to Business Associate: A CISO’s Perspective on Applying Controls to Identified Risks

Business Associate to Business Associate: A CISO’s Perspective on Applying Controls to Identified Risks

Thoughtful selection, implementation, management, and monitoring of technical controls is required for ongoing risk management hygiene.
Encompass Health Automates Its HIPAA Compliant Risk Assessment & Strengthens Security Risk Management

Encompass Health Automates Its HIPAA Compliant Risk Assessment & Strengthens Security Risk Management

Clearwater partnered with Encompass Health to implement its enterprise Risk Analysis and Cyber Risk Management ...
Carrying Out a HIPAA Corrective Action Plan

Carrying Out a HIPAA Corrective Action Plan

What the University of Rochester Medical Center Learned From the Process Originally published by ISMG Mark ...
HR 7898: More Incentive for Healthcare Entities to Adopt Cybersecurity Best Practices

HR 7898: More Incentive for Healthcare Entities to Adopt Cybersecurity Best Practices

This new law requires the U.S. Department of Health and Human Services (HHS) to consider a healthcare entity's adoption of cybersecurity best practices when determining the length and outcome of audits or the amount of fines or extent of penalties it will impose.
A Look at the Impact of the MD Anderson Court of Appeals Decision on OCR and Your Healthcare Entity

A Look at the Impact of the MD Anderson Court of Appeals Decision on OCR and Your Healthcare Entity

What we can learn from this to help better prepare your organization for potential interactions with OCR now and in the future?
Business Associate to Business Associate: A CISO’s Perspective

Business Associate to Business Associate: A CISO’s Perspective

In this blog and others that will follow in the series, it’s my goal to share insight on how we think about and approach the security of our solutions with other organizations that serve as Business Associates (BA) in the healthcare industry.
Key Things to Know About Proposed HIPAA Privacy Rule Changes

Key Things to Know About Proposed HIPAA Privacy Rule Changes

If the proposed changes become the final rule, the effective date will be 60 days from publication of the final rule.
How Enterprise Cyber Risk Management Can Facilitate Compliance Efficiency

How Enterprise Cyber Risk Management Can Facilitate Compliance Efficiency

HIPAA is not the only law that addresses data privacy and security within the healthcare industry.
EHRs and Ransomware: Protecting Your Crown Jewel

EHRs and Ransomware: Protecting Your Crown Jewel

Throughout this past fall, international criminal organizations asserted their dominance over the healthcare sector through ransomware.
Getting Proactive about the Ransomware Threat

Getting Proactive about the Ransomware Threat

Throughout this past fall, international criminal organizations asserted their dominance over the healthcare sector through ransomware.
Yesterday’s Cyber Risk is not Today’s Cyber Risk

Yesterday’s Cyber Risk is not Today’s Cyber Risk

Over the past 10 years, the healthcare industry’s understanding of cyber risk has evolved through four distinct phases, emphasizing four different aspects of cyber risk. Understanding these four different phases gives context for where healthcare cyber risk began and where it is now.

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource