Clearwater
  • Managed Services
    • ClearAdvantage® Program
    • ClearConfidence™ Program
    • Managed Security Services
    • Patient Privacy Monitoring Services
    • Vendor Risk Management as a Service
    • Cybersecurity Assist Partner Program (CAPP)
  • Cybersecurity
    • Program Leadership & Transformation
    • OCR-Quality® Risk Analysis
    • OCR-Quality® Risk Response
    • Resiliency Services
    • Security Engineering
    • Technical Testing
    • NIST CSF Maturity Assessment
    • Vendor Risk Management
    • Cloud Security
    • Medical Device Security
    • 405(d) HICP Assessment
    • Security Controls Validation Assessment
  • Compliance
    • HIPAA
    • SOC 2 Readiness
    • HITRUST
    • Additional Privacy & Compliance Assessments
    • CMMC
  • IRM|Pro® Software
    • IRM|Analysis®
    • IRM|Privacy®
    • IRM|Security®
    • IRM|405(d) HICP™
  • Who We Serve
    • Hospitals & Health Systems
    • Regional & Critical Access Hospitals
    • Physician Practice Management Groups
    • Digital Health
    • Medical Devices/MedTech
    • Healthcare Business Service Providers
    • Health Plans
    • Healthcare Attorneys
    • Healthcare Investors
  • About Us
    • Company Overview
    • Leadership
    • Mission & Values
    • Careers
    • News
  • Resources
    • Blog
    • Webinars & Events
    • Case Studies
    • On-Demand Webinars
    • White Papers
    • eBooks
    • Podcasts
    • Book: Stop the Cyber Bleeding
  • Contact
Select Page
Protecting Patient Health Information: The MIPS Requirement for Security Risk Analysis

Protecting Patient Health Information: The MIPS Requirement for Security Risk Analysis

by admin | Aug 8, 2022 | Blog, White Papers

Introduction In 2015, the U.S. Congress passed a new law, the Medicare Access and CHIP Reauthorization Act (MACRA), which changed how Medicare Part B clinicians manage their fee schedules through a newly created Quality Payment Program (QPP). Prior to MACRA, Medicare...
Critical Differences Between HIPAA Security Evaluations and Risk Analysis

Critical Differences Between HIPAA Security Evaluations and Risk Analysis

by admin | Jun 30, 2022 | Blog, White Papers

Introduction When it comes to electronic personal health information (ePHI), HIPAA requires all covered entities and business associates to be compliant with the HIPAA Security Rule. Unfortunately, many healthcare organizations struggle with Security Rule compliance....
Technical Testing and the HIPAA Security Rule: What’s Needed to Protect Your Healthcare Organization

Technical Testing and the HIPAA Security Rule: What’s Needed to Protect Your Healthcare Organization

by admin | Jan 4, 2022 | Blog, White Papers

Introduction The HIPAA Security Rule, is a set of national standards designed to help organizations protect PHI that’s created, received, used, or maintained by a healthcare covered entity, with compliance expectations that extend to business associates as well....
Driving Compliance Efficiency Through Enterprise Cyber Risk Management (Copyright 2021 Compliance Today)

Driving Compliance Efficiency Through Enterprise Cyber Risk Management (Copyright 2021 Compliance Today)

by admin | Dec 29, 2021 | Blog, White Papers

By Bob Chaput, CISSP, HCISPP, CRISC, CIPP/US C/EH Founder & Executive Chairman Introduction The business case for cyber risk management is clear. A cyber incident can lead to consequences that threaten the care and safety of patients. Cyber incidents can also...
The Legal Liabilities of Enterprise Cyber Risk Management

The Legal Liabilities of Enterprise Cyber Risk Management

by admin | Dec 29, 2021 | White Papers

« Older Entries

Recent Posts

  • A Blueprint for Success Part 1: Embracing Cybersecurity Realities 
  • New York Hospital Cybersecurity: A Look at the Proposed Regulations, Implementation, and Grant Impact | December 14 @ 2:00 CT
  • Clearwater Once Again Rated Healthcare’s Top Cybersecurity Consultants and Compliance and Risk Management Solution
  • Paralegals on Fire! Podcast: Paralegal to Compliance Officer
  • The Hidden HITRUST CSF v11 Sub-Requirements

Recent Comments

No comments to show.
  • Managed Services
    • ClearAdvantage®
    • ClearConfidence™
    • Managed Security Services
    • Patient Privacy Monitoring Services
    • Vendor Risk Management as a Service
    • Cybersecurity Assist Partner Program (CAPP)
  • Cybersecurity
    • Program Leadership & Management
    • OCR-Quality® Risk Analysis
    • OCR-Quality® Risk Response
    • Resiliency Services
    • Security Engineering
    • Technical Testing
    • NIST CSF Maturity Assessment
    • Vendor Risk Management
    • Cloud Security
    • Medical Device Security
    • 405(d) HICP Assessment
    • Security Controls Validation Assessment
  • Compliance
    • HIPAA
    • SOC 2 Readiness
    • HITRUST
    • Additional Privacy & Compliance Assessments
    • CMMC
  • IRM|Pro® Software
    • IRM|Analysis®
    • IRM|Privacy®
    • IRM|Security®
    • IRM|405(d) HICP™
  • Who We Serve
    • Hospitals & Health Systems
    • Regional & Critical Access Hospitals
    • Physician Practice Management Groups
    • Digital Health
    • Medical Devices/MedTech
    • Health Plans
    • Healthcare Attorneys
    • Healthcare Investors
    • Healthcare Business Service Providers
  • Resources
    • Blog
    • Case Studies
    • Webinars & Events
    • On-Demand Webinars
    • White Papers
    • eBooks
    • Podcasts
    • Book: Stop the Cyber Bleeding
  • About Us
    • Company Overview
    • Leadership
    • Mission & Values
    • Careers
    • News
    • Contact

Terms of Use  |  Privacy Policy
©2023 Clearwater Security & Compliance LLC