by Dawn Morgenstern | Sep 7, 2023 | Blog
It’s 4:45 p.m. on a Friday. You’ve had a great week. You’re busy shutting down all your equipment and are ready to head home when a colleague peeks into your office. There’s a problem with one of your core systems. None of the end-of-week patient billing statements...
by Henry Sprafkin | Jun 7, 2021 | Blog
The first two installments in this series focused on risk management and risk-based control selection. While not a requirement, it is best to build the security control library based on an established control framework. There are over 200 different risk management,...
by Bob Chaput | Feb 2, 2021 | Blog
How Enterprise Cyber Risk Management Can Facilitate Compliance Efficiency HIPAA is not the only law that addresses data privacy and security within the healthcare industry. There are many other laws and regulations which apply to specific types of data and/or...
by Jon Moore | Jan 15, 2021 | Blog
Last year, more than a dozen health systems were driven into EHR downtime by ransomware attacks. The EHR is the information system equivalent to the heart of a healthcare provider. All-important patient information flows through these critical information systems. In...
by Jon Moore | Jan 11, 2021 | Blog
Throughout this past fall, international criminal organizations asserted their dominance over the healthcare sector through ransomware. By the end of November, more than a dozen health systems were driven into EHR downtime by ransomware attacks. The pandemic’s...