Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Identifying and Evaluating Vendor Risks with the Help of HIC-SCRiM

Identifying and Evaluating Vendor Risks with the Help of HIC-SCRiM

Traditionally, when healthcare professionals discussed supply chains, it generally referred to outside vendors who provided equipment and products to facilitate the delivery of care
Telehealth Insecurity: Evaluating Emerging Threats and Risk Response

Telehealth Insecurity: Evaluating Emerging Threats and Risk Response

The past few months have seen a marked increase in cybercrime activities aimed at exploiting the chaos and disarray that has arisen as a result of the COVID-19 pandemic
Performing OCR-Quality® Risk Analysis on New Systems and Processes

Performing OCR-Quality® Risk Analysis on New Systems and Processes

In the wake of the COVID-19 pandemic, healthcare organizations have seen a large percentage of their workforce start working remotely
Compelling Reasons for Business Associates to Outsource their HIPAA Privacy & Security Program as a Managed Service

Compelling Reasons for Business Associates to Outsource their HIPAA Privacy & Security Program as a Managed Service

A Strong HIPAA Privacy and Security Program Creates a Competitive Advantage
Responding to OCR’s Notice of Enforcement Discretion for Telehealth Remote Communications

Responding to OCR’s Notice of Enforcement Discretion for Telehealth Remote Communications

Responding to OCR’s Notice of Enforcement Discretion for Telehealth Remote Communications By, Wes Morris, ...
Identifying and Implementing Appropriate Security Controls in Your Telehealth Architecture

Identifying and Implementing Appropriate Security Controls in Your Telehealth Architecture

The recently passed Coronavirus Aid, Relief and Economic Security (CARES) Act provides a $300 million boost in ...
10 Actions for Business Associates to Build a Strong HIPAA Compliance and Cybersecurity Program

10 Actions for Business Associates to Build a Strong HIPAA Compliance and Cybersecurity Program

While most healthcare organizations agree that Health Insurance Portability and Accountability Act (HIPAA) ...
A Limited Waiver of Sanctions for the HIPAA Privacy Rule Does Not Mean Covered Entities Can Ignore Their Responsibilities

A Limited Waiver of Sanctions for the HIPAA Privacy Rule Does Not Mean Covered Entities Can Ignore Their Responsibilities

Wes Morris, Managing Principal Consultant Dawn Morgenstern, Senior Principal Consultant George W. Jackson, Jr., ...
Clearwater COVID-19 Cybersecurity Advisory: Analyzing and Responding to Risks Resulting from Work- from-Home Environments

Clearwater COVID-19 Cybersecurity Advisory: Analyzing and Responding to Risks Resulting from Work- from-Home Environments

Clearwater Customers can perform risk assessment using their existing IRM|Analysis® software and can leverage free ...
Security Considerations for Deploying Telehealth and Remote Patient Monitoring Systems

Security Considerations for Deploying Telehealth and Remote Patient Monitoring Systems

By  George W. Jackson, Jr., MBA, Ph.D., HCISPP, CISSP, CRISC, PMP In a time of public crisis where millions of ...
Building an Effective Vendor Risk Management Program

Building an Effective Vendor Risk Management Program

By Dawn Morgenstern and Katie Sullivan Late last month, news broke of a ransomware attack on an EHR provider ...
New Ruling Requires Healthcare Organizations to Rethink Charges for Providing Records to Third Parties

New Ruling Requires Healthcare Organizations to Rethink Charges for Providing Records to Third Parties

Wes Morris, Managing Principal Consultant Dawn Morgenstern, Senior Principal Consultant  On January 23, ...

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource