Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

The State of Privacy Law in California and What It Means for Healthcare

The State of Privacy Law in California and What It Means for Healthcare

California is one state that has done quite a bit to go beyond the protections provided under HIPAA, as reflected by the California Consumer Privacy Act (CCPA) that is now in force in the state.
How COVID-19 is Changing the Information Security Landscape

How COVID-19 is Changing the Information Security Landscape

Steve Cagle, CEO of Clearwater Compliance, shares how healthcare companies can manage risk around the new cybersecurity challenges many are facing.
Tech Leaders Share Insights on Healthcare Data Privacy and Security

Tech Leaders Share Insights on Healthcare Data Privacy and Security

With third-party breaches continuing to rise, healthcare providers have drastically increased their expectations and standards for vendors (classified as “Business Associates” under HIPAA) to safeguard patient data.
Interpreting the Move Toward Interoperability

Interpreting the Move Toward Interoperability

On May 1, 2020, the Department of Health and Human Services (HHS) published two Final Rules in the Federal Register targeted at improving interoperability and patient access to health information.
A Multi-Tiered Approach to Risk Monitoring Strategy

A Multi-Tiered Approach to Risk Monitoring Strategy

The HIPAA Security Rule, as well as NIST and other standards, stipulate that a risk analysis and risk management process should be ongoing, and not a once and done process.
The Intersection of Physical Security and Cybersecurity

The Intersection of Physical Security and Cybersecurity

A late 2018 survey of College of Healthcare Information Management Executives (CHIME) members showed physical-cyber security integration to be a critical or important topic.
The Purpose and Power of Data Loss Prevention Tools

The Purpose and Power of Data Loss Prevention Tools

We are living in a time where sensitive information flows seamlessly through organizations and out to employees across the country and around the globe.
Past Breaches May Cause Future Liabilities

Past Breaches May Cause Future Liabilities

Over the last decade, strategic acquirers and private equity investors have integrated thousands of HIPAA covered entities and business associates into their portfolios. Through these experiences, they have become much better educated on the regulatory and reputational risk counterparties bring as a result of a privacy or security breach.
Using Clearwater’s IRM|Analysis® Software to Perform an OCR-Quality® Risk Analysis on Telehealth Systems

Using Clearwater’s IRM|Analysis® Software to Perform an OCR-Quality® Risk Analysis on Telehealth Systems

If your organization accelerated the implementation of new telehealth systems to meet the demand brought on by the COVID-19 pandemic, you may find yourself regrouping now and contemplating the need to perform a detailed risk analysis of all of your telehealth assets, policies and procedures.
How to Choose the Right HIPAA Compliance and Cyber Risk Management Partner

How to Choose the Right HIPAA Compliance and Cyber Risk Management Partner

If your business serves the healthcare industry, invariably you will be entrusted to receive electronic protected health information (PHI). You’ll quickly learn that a strong HIPAA compliance and cybersecurity program is essential
A Thoughtful Approach to Managing Cyber Risk

A Thoughtful Approach to Managing Cyber Risk

Risk response requires setting your risk threshold and understanding your risk appetite. It requires real risk analysis as a foundation. Risk response is about informed decision making
Understanding Risk Assessment Frameworks and How They Help Reduce Vendor Risks

Understanding Risk Assessment Frameworks and How They Help Reduce Vendor Risks

Whether you’re new to cybersecurity and building a program for your organization or you’re an experienced InfoSec pro looking to mature your existing program, risk assessment frameworks are key

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource