Incident Is Latest Reminder of Business Associate Security Risks
Technical Testing and the HIPAA Security Rule: What’s Needed to Protect Your Healthcare Organization
Introduction The HIPAA Security Rule, is a set of national standards designed to help organizations protect PHI that’s created, received, used, or maintained by a healthcare covered entity, with compliance expectations that extend to business associates as well....
How Physician Groups Can Overcome Common Cybersecurity and HIPAA Compliance Challenges
Introduction Across the healthcare industry, large physician groups are becoming increasingly common, as investors bring disparate physician practices together to keep up with healthcare challenges and ever-more complex treatment and service delivery needs. Today,...
Building Frameworks to Manage Healthcare Data Within the Changing U.S. Privacy Landscape
Introduction As the world is more connected to digital life, state and federal agencies are issuing a growing number of standards and mandates focused on data privacy and protection. Across the U.S., many states—for example, California, Nevada, and Maine—have already...
Risky Business: How to Conduct a NIST-based Risk Analysis to Comply with the HIPAA Security Rule
In addition to being a HIPAA Security Rule requirement, conducting regular risk analyses is a fundamental business practice, yet many healthcare organizations struggle with the basics, from understanding Introduction Despite many warnings from the Office for Civil...
Build A Culture of Compliance Through Principle-Based Policy Governance
Introduction Organizations of all sizes struggle with embedding policies and procedures successfully into their day-to-day operations. That’s because for many, these policies fill binders and shared drives, overwhelming employees with pages and pages of instruction...
Entities Dealing With Email Breach, IT Systems/Phone Outage
Latest Incidents Foreshadow Challenges Heading Into New Year
Report Dissects Conti Ransomware Attack on Ireland’s HSE
Outlines Key Shortcomings That Country’s National Health System Must Address
Keys to an Effective HIPAA Data Breach Response
Wes Morris, Managing Principal Consultant, Clearwater, speaks with Andrea Lee Linna, Partner, McGuireWoods, about the key steps that can make the difference between an organization's effective response to a HIPAA data breach and one that sets it down a troublesome...
How to stop ransomware? It starts with an enterprise risk management program
“It’s not about ultimate security. It’s about doing what’s right for the organization, and it should be business-driven,” said one expert at the HIMSS Healthcare Cybersecurity Forum.