Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Clearwater COVID-19 Cybersecurity Advisory: Analyzing and Responding to Risks Resulting from Work- from-Home Environments

Clearwater COVID-19 Cybersecurity Advisory: Analyzing and Responding to Risks Resulting from Work- from-Home Environments

Clearwater Customers can perform risk assessment using their existing IRM|Analysis® software and can leverage free ...
Security Considerations for Deploying Telehealth and Remote Patient Monitoring Systems

Security Considerations for Deploying Telehealth and Remote Patient Monitoring Systems

By  George W. Jackson, Jr., MBA, Ph.D., HCISPP, CISSP, CRISC, PMP In a time of public crisis where millions of ...
Building an Effective Vendor Risk Management Program

Building an Effective Vendor Risk Management Program

By Dawn Morgenstern and Katie Sullivan Late last month, news broke of a ransomware attack on an EHR provider ...
New Ruling Requires Healthcare Organizations to Rethink Charges for Providing Records to Third Parties

New Ruling Requires Healthcare Organizations to Rethink Charges for Providing Records to Third Parties

Wes Morris, Managing Principal Consultant Dawn Morgenstern, Senior Principal Consultant  On January 23, ...
Business Impact Analysis: A Critical Process to Improve Resiliency in Wake of a Cyberattack

Business Impact Analysis: A Critical Process to Improve Resiliency in Wake of a Cyberattack

On the heels of a major wave of ransomware activity in late 2019, this week healthcare organizations find ...
Making Cyber Risk Management an Ongoing Process

Making Cyber Risk Management an Ongoing Process

With new changes in technology, organizations must consider new threats and vulnerabilities as they are discovered.
OCR Re-Affirms Enterprisewide Risk Analysis is the “Most Important Thing You Can Do to Protect Yourself” Against a Cyber Attack

OCR Re-Affirms Enterprisewide Risk Analysis is the “Most Important Thing You Can Do to Protect Yourself” Against a Cyber Attack

“Attacks are now more sophisticated and more targeted,” Office for Civil Rights Director Roger Severino said. “The single most important thing you can do to protect yourself is to conduct a risk analysis.”
Developing a More Secure PACS Ecosystem

Developing a More Secure PACS Ecosystem

The security of medical images took center stage this past week as Senator Mark Warner of Virginia demanded that TridentUSA and its affiliate MobileXUSA outline their cybersecurity practices after ProPublica reported the imaging firms left millions of medical records and patient data exposed online.
What the New York SHIELD Act Means for Healthcare Organizations

What the New York SHIELD Act Means for Healthcare Organizations

On July 25, 2019 the Governor of New York signed into law the “Stop Hacks and Improve Electronic Data Security Act” (SHIELD ACT) effective March 21, 2020.
The Rise of Enterprise Cyber Risk Management Software

The Rise of Enterprise Cyber Risk Management Software

The digital transformation of healthcare is rapidly driving the adoption of new technology and information systems to support key business initiatives. We are experiencing a veritable explosion in health care data, systems and devices.
Understanding What Constitutes OCR-Quality Risk Analysis®

Understanding What Constitutes OCR-Quality Risk Analysis®

In the first half of 2019, there were 223 reported breaches affecting 10.2 million individuals, an increase of 167% over the same period in 2018. These figures do not include the widely publicized American Medical Collections Agency breach, which is estimated to have affected at least 22 million individuals on its own.
Understanding the True Cost of a Data Breach

Understanding the True Cost of a Data Breach

In the case of American Medical Collection Agency’s (AMCA) highly publicized data breach, the cost proved unrecoverable as the 42-year-old parent company Retrieval-Masters Credit Bureau filed for bankruptcy just weeks after disclosing the breach. Organizations should calculate the risk of a data breach, not only for covered entities but also for their business associates. A breach of your patient data will affect your organization, even if it’s by a business associate.

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource