by Jon Stone | Jun 1, 2020 | Blog
As my colleague Alex Masten did an excellent job of describing in another recent Clearwater blog, the HIPAA Security Rule maintains that a risk analysis must be performed as new systems and technologies are implemented, or there are any material environmental changes....
by Clearwater | May 26, 2020 | Blog
Whether you’re new to cybersecurity and building a program for your organization or you’re an experienced InfoSec pro looking to mature your existing program, risk assessment frameworks are key. A risk assessment framework is a way to understand and evaluate security...
by Dawn Morgenstern | May 14, 2020 | Blog
Traditionally, when healthcare professionals discussed supply chains, it generally referred to outside vendors who provided equipment and products to facilitate the delivery of care. While that remains true today, third-party suppliers now extend beyond those...
by George W. Jackson, Jr., MBA, Ph.D., HCISPP, CISSP, PMP | May 6, 2020 | Blog
The past few months have seen a marked increase in cybercrime activities aimed at exploiting the chaos and disarray that has arisen as a result of the COVID-19 pandemic, particularly in the field of healthcare. This threat prompted senators Richard Blumenthal,...
by admin | Apr 17, 2020 | In the News
Opportunistic hackers look to infiltrate networks; phishing attacks up 600%