Healthcare Compliance Software

Our HIPAA compliance and risk management software can also be used for other security frameworks such as HITRUST, NIST and PCI.

Learn More

Healthcare Compliance Consulting

We focus on information security audits that cover all control standards, identify gaps, and deliver a holistic risk mitigation roadmap.

  • All audit results are delivered in our compliance management software portal, not a spreadsheet

  • Our consultants are seasoned subject matter experts, not juniors

  • We are engaged by clients across the country and can provide excellent referrals upon request

Learn More

Solutions
for
MSPs

Our HIPAA compliance software is used by managed service providers (MSPs) who provide general IT and HIPAA services to their clients.

  • Using unstructured tools makes the management of client audits difficult

  • Provides your organization with a better way to manage your clients higher volume business associate audits

  • Manage your clients by exception with extensive filters, automated alerts, and notifications

Learn More
Healthcare organizations of all sizes trust ComplyAssistant.
Centra State Healthcare System
AtlantiCare Healthcare
Gnyha contracted reduced
St. Joseph's Healthcare System
Palisades Medical Center
Christian Health Care Center

Free Tools

Medical Device Security Assessment Sample
Free

Free 20 question sample from our 120 question medical device vendor assessment. Make sure your organization knows the cybersecurity vulnerabilities associated with your medical devices

HIPAA Privacy and Security Proactive Audits Tool Kit
Free

Contains recommended HIPAA Privacy and Security audits that your organization should consider implementing for policies & procedures, proactive information system activity review, and facility walk throughs.

HIPAA Facility Security Walkthrough Checklist
Free

Excellent guidance for auditing facilities that contain protected health information. Simply check the boxes and write notes as you conduct your walk-through audit.

Tips

HIPAA and Social Media – The Need for Policies and Training

Healthcare organizations and their third party vendors have an obligation to the federal government and their patients to abide by the HIPAA regulations. Unfortunately the very foundation of social media opposes everything in relation to the privacy, security, and confidentiality of information. Social media allows for anyone to see your organizations information, at any time, in any part of the world.

Why Empowering the CISO is Important for Healthcare Information Security Risk Management

We are starting to see Chief Information Security Officers (CISOs) reporting outside of Information Technology (IT). This makes sense because the CISO needs to be able to audit the IT controls and give an unbiased report to senior management.

How to avoid HIPAA penalties based on some of the largest!

Reviewing some of the largest fines can help healthcare organizations learn how to avoid them should an incident occur. Many experts say that it isn’t IF an incident will occur, it’s WHEN.

Updates

Third Party (BA) Contract and Privacy and Security Risk Management

The HITECH-OMNIBUS final rule stepped up the requirements and for both CEs and BAs and both must now include the new requirements in their information privacy and security risk analysis and management program.

Office of Civil Rights Phase 2 HIPAA Audit Protocols

Based on prior statements from the OCR and their recently distributed survey, the pool of audit candidates will be approximately 800 to start. These randomly selected organizations will be chosen using the National Provider Identifier database and other external sources.

Business Intelligence and Big Data – What are the HIPAA Privacy and Security Impacts?

Since we are talking about healthcare information we must talk about protected health information (PHI) and the HIPAA-HITECH-OMNIBUS Privacy, Security, and Breach Notification Rules. BI and Big Data analysis that includes PHI and its use and disclosure must be reviewed against the HIPAA security and privacy requirements and the breach notification requirements.

Prepare and Protect.

Contact Us Today