An often overlooked aspect of HIPAA compliance is the selection of a HIPAA Security Officer and HIPAA Privacy Officer. These roles are often filled by..
New data indicates that small and medium healthcare organizations are a growing target of ransomware attacks. The data also suggests that of the..
Last week we discussed incident investigation and determining when an incident is classified as a breach. This week we will take the next step and..
There's an age-old adage: The chicken or the egg? Which one came first? In a lot of ways, when it comes to a time-tested cybersecurity program, the..
The end of the year is almost here, and that means now is the time to begin completing those HIPAA security and privacy items you need to get done..
An often overlooked aspect of HIPAA compliance is the selection of a HIPAA compliance officer or HIPAA privacy officer. These roles are often filled by..
More and more the healthcare industry is adding cyber insurance as a component of its risk management strategy and a part of required healthcare cyber..
Completing a security risk analysis (aka a risk assessment) is an essential component of HIPAA compliance and keeping PHI safe. While completing a risk..
In HIPAA compliance, time and financial resources must be allocated in the ways that provide the highest return on the investment. Traditionally, that..