Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Empowering Providers Through a Technology-Driven Physician Practice Management Platform

Empowering Providers Through a Technology-Driven Physician Practice Management Platform

How a Fast-Growing Group of Autonomous Physicians Manages Cyber Risk.
Protecting Patient Health Information: The MIPS Requirement for Security Risk Analysis

Protecting Patient Health Information: The MIPS Requirement for Security Risk Analysis

Introduction In 2015, the U.S. Congress passed a new law, the Medicare Access and CHIP Reauthorization Act ...
Understanding Insider Threats and How to Protect Your Organization

Understanding Insider Threats and How to Protect Your Organization

Insider threats across many industries are on the rise, and there’s no immunity for healthcare.
A Growing Must Have for Healthcare: MDR

A Growing Must Have for Healthcare: MDR

There are plenty of options as the market is growing and evolving but finding the right fit for each organization takes time. MDR is not the same across every provider, and it makes sense to understand the origins and evolution since there is really not a one size fits all.
Digital Patient Communication: Reducing Risk While Engaging Patients Digitally

Digital Patient Communication: Reducing Risk While Engaging Patients Digitally

We live in a fast-paced, technology-driven world. As such, consumers have a growing list of expectations when communicating with companies, and healthcare is no exception.
Why Your Point-in-Time Risk Analysis Isn’t Enough

Why Your Point-in-Time Risk Analysis Isn’t Enough

Cyber risk management can be difficult for most organizations. That’s because as organizations adopt new technologies to streamline operations and offer better services to their clients, the attack surface—and opportunities for potential breaches—grow with it.
Critical Differences Between HIPAA Security Evaluations and Risk Analysis

Critical Differences Between HIPAA Security Evaluations and Risk Analysis

Introduction When it comes to electronic personal health information (ePHI), HIPAA requires all covered ...
Strong Cybersecurity and HIPAA Compliance Program Positions CaringWays for Growth

Strong Cybersecurity and HIPAA Compliance Program Positions CaringWays for Growth

CaringWays partners with Clearwater to help develop and implement a cloud-based security program for its AWS-based fundraising platform
A Holistic Approach to Cyber Risk Management

A Holistic Approach to Cyber Risk Management

How Comprehensive System Management Can Help Healthcare Organizations Better Manage Security and Compliance Beyond the EHR.
Multifactor Authentication: An Extra Layer of Security for Healthcare Organizations and Business Associates

Multifactor Authentication: An Extra Layer of Security for Healthcare Organizations and Business Associates

While attackers have long had their eyes on healthcare organizations for the sensitive personal health information (PHI) in their coffers, the increased adoption of telehealth services and remote teams have added incentive to seek out evolving security weaknesses.
Owensboro Health on Taking Cyber Risk Management Beyond the EHR

Owensboro Health on Taking Cyber Risk Management Beyond the EHR

Early in 2021, Owensboro Health decided to expand their cyber risk management strategy and initiate a continuous, comprehensive enterprise cyber risk management program through Clearwater’s ClearConfidence™ offering.
Understanding Health Apps, HIPAA, & the FTC: How They’re Connected & Why it Matters

Understanding Health Apps, HIPAA, & the FTC: How They’re Connected & Why it Matters

Introduction Blood sugar monitors. Smartwatches. Heart monitors. Weight and exercise trackers. In the last ...

Newsletter

Sign up to receive our monthly newsletter featuring resources curated specifically to your concerns.


Featured Resource