By Art Gross – While it is required within HIPAA rules and regulations to complete a risk assessment regularly, the question may still be in your mind regarding WHY you have to do this. The legal ramifications are obvious.Read More
Security Risk Assessment
By Art Gross – As the digital ecosystem continues to thrive and advance, so too must the regulations and practices for safely caring for sensitive data. That is especially true for the healthcare industry, which continues to be a prime target for cybercriminals.
By Ken Reiher – Conducting regular HIPAA security risk assessments helps CEs ensure compliance with HIPAA’s administrative, physical and technical safeguards, and helps expose areas where an organization’s protected health information could be at risk.
By Art Gross – As the value of healthcare data remains high, there is no denying that healthcare organizations make prime targets for cybercriminals. To wreak havoc and make a profit from compromised patient data, cybercriminals exploit weak spots in healthcare organizations…
Patients expect not only quality health care to keep them healthy, but also trust that their most sensitive health information will be protected from threats and vulnerabilities that could lead to the compromise of one’s health information.
By Carl Kunkleman – I recently recorded an episode of Matt Ferrari’s podcast series CTO Talk, in which he and I discussed the importance of security risk assessments. The episode will be airing on HealthcareNOW Radio starting November 22, and I encourage you to check it out.
By Grant Elliott – Reported data breaches show that HIPAA violation settlements are on the upswing, both in terms of the number of individuals affected and financial cost. We’re not done with 2017,
By Jonathan Krasner – There are a large number of potential attack vectors on any network. Medical devices on a healthcare network is certainly one of them. While medical devices represent a potential threat, it is important to keep in mind that the threat level posed by any given medical device should be determined by a Security Risk Assessment (SRA) and dealt with appropriately.
More Preparation is Required! By Jay Trinckes, President/CEO Eagle Trace Security Consulting, Inc. Twitter: @hitechpo Twitter: @EagleTraceSecur As we all know by now, the Office…