Blog
We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.
Identifying and Implementing Appropriate Security Controls in Your Telehealth Architecture
The recently passed Coronavirus Aid, Relief and Economic Security (CARES) Act provides a $300 million boost in ...
10 Actions for Business Associates to Build a Strong HIPAA Compliance and Cybersecurity Program
While most healthcare organizations agree that Health Insurance Portability and Accountability Act (HIPAA) ...
A Limited Waiver of Sanctions for the HIPAA Privacy Rule Does Not Mean Covered Entities Can Ignore Their Responsibilities
Wes Morris, Managing Principal Consultant
Dawn Morgenstern, Senior Principal Consultant
George W. Jackson, Jr., ...
Clearwater COVID-19 Cybersecurity Advisory: Analyzing and Responding to Risks Resulting from Work- from-Home Environments
Clearwater Customers can perform risk assessment using their existing IRM|Analysis® software and can leverage free ...
Security Considerations for Deploying Telehealth and Remote Patient Monitoring Systems
By George W. Jackson, Jr., MBA, Ph.D., HCISPP, CISSP, CRISC, PMP
In a time of public crisis where millions of ...
Building an Effective Vendor Risk Management Program
By Dawn Morgenstern and Katie Sullivan
Late last month, news broke of a ransomware attack on an EHR provider ...
New Ruling Requires Healthcare Organizations to Rethink Charges for Providing Records to Third Parties
Wes Morris, Managing Principal Consultant
Dawn Morgenstern, Senior Principal Consultant
On January 23, ...
Business Impact Analysis: A Critical Process to Improve Resiliency in Wake of a Cyberattack
On the heels of a major wave of ransomware activity in late 2019, this week healthcare organizations find ...
Making Cyber Risk Management an Ongoing Process
With new changes in technology, organizations must consider new threats and vulnerabilities as they are discovered.
OCR Re-Affirms Enterprisewide Risk Analysis is the “Most Important Thing You Can Do to Protect Yourself” Against a Cyber Attack
“Attacks are now more sophisticated and more targeted,” Office for Civil Rights Director Roger Severino said. “The single most important thing you can do to protect yourself is to conduct a risk analysis.”
Developing a More Secure PACS Ecosystem
The security of medical images took center stage this past week as Senator Mark Warner of Virginia demanded that TridentUSA and its affiliate MobileXUSA outline their cybersecurity practices after ProPublica reported the imaging firms left millions of medical records and patient data exposed online.
What the New York SHIELD Act Means for Healthcare Organizations
On July 25, 2019 the Governor of New York signed into law the “Stop Hacks and Improve Electronic Data Security Act” (SHIELD ACT) effective March 21, 2020.
Newsletter
Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.
Featured Resource
Introduction
Across the healthcare industry, large physician groups are becoming increasingly common, as ...