Blog
We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Heightened Cybersecurity Vigilance Required Once Again
Information and resources to help you navigate the cybersecurity implications of the Russia-Ukraine conflict

Keeping Patient Data Secure in the Cloud
Introduction
In the past three decades, cloud computing as we now know it has undergone many changes. Long gone ...

Technical Testing and the HIPAA Security Rule: What’s Needed to Protect Your Healthcare Organization
Introduction
The HIPAA Security Rule, is a set of national standards designed to help organizations ...

How Physician Groups Can Overcome Common Cybersecurity and HIPAA Compliance Challenges
Introduction
Across the healthcare industry, large physician groups are becoming increasingly common, as ...

HIPAA Primer Requirements for Business Associates
Protecting PHI: The Buck Stops Here for BAs
Introduction
With both increased OCR investigations and ...

Building Frameworks to Manage Healthcare Data Within the Changing U.S. Privacy Landscape
Introduction
As the world is more connected to digital life, state and federal agencies are issuing a growing ...

Driving Compliance Efficiency Through Enterprise Cyber Risk Management (Copyright 2021 Compliance Today)
By Bob Chaput, CISSP, HCISPP, CRISC, CIPP/US C/EH Founder & Executive Chairman
Introduction
The business ...

Risky Business: How to Conduct a NIST-based Risk Analysis to Comply with the HIPAA Security Rule
In addition to being a HIPAA Security Rule requirement, conducting regular risk analyses is a fundamental business ...

Build A Culture of Compliance Through Principle-Based Policy Governance
Introduction
Organizations of all sizes struggle with embedding policies and procedures successfully into their ...

New Standardized Health Care Application Programming Interfaces (APIs)
Will the Hoped-For Rewards from Improved Interoperability and Reduced Information Blocking Outweigh the Potential ...

How to Make System Activity Reviews an Effective Part of Your Security Program
Introduction
As a covered entity or business associate, the Health Insurance Portability and Accountability Act ...

Securing Healthcare’s Digital Transformation for Providers, Vendors, and Patients
At least 44% of healthcare organizations have experienced a breach in the past 12 months, with 74% of respondents attributing the breaches to giving too much access privileges to third-parties.