If you’re considering HITRUST compliance as a cybersecurity framework, here is a list of the top 8 points you should consider before moving ahead.
We know. It can be difficult to find accurate and consistent information on HIPAA and the temporary changes due to COVID-19. To that end, we’ve put together a timeline and brief descriptions of the notifications and guidance issued by the OCR during the COVID-19 public health emergency.
With a seemingly infinite number of digital pathways right to the doorsteps of healthcare providers, we need to work even harder to protect information that could be exposed online. That includes vendor risk management…
Even prior to the COVID-19 pandemic, ransomware attacks were on the rise. “COVID has simply increased risk of attacks due to more locations with a remote workforce, [protected health information] through telehealth, more phishing attacks, more opportunities that hackers like to take advantage of.”
The news late last year around Project Nightingale aroused interest from both healthcare organizations and the public on how and when protected health information (PHI) should be shared. With new technologies, new entrants to the healthcare market, how can healthcare providers balance HIPAA, cybersecurity protections, and the need to easily share data to improve patient care?
Though telecommuting was on already on the rise at a rate of 2-3% per year, the COVID-19 pandemic required healthcare organizations to re-evaluate work from home policies and quickly enable a remote workforce. But, in the midst of a pandemic, when you have to act as quickly as possible, how do you also make sure your networks and operations are still protected?
For compliance-minded HIM professionals, the COVID-19 pandemic presented curve ball after curve ball thanks to the flood of waivers from the federal government temporarily loosening certain HIPAA and telehealth regulations.
With the exponential growth in vulnerabilities over the past decade, healthcare organizations look to supplement HIPAA regulations with other types of cybersecurity frameworks. The recent uptick in telehealth and telecommuting during the COVID-19 pandemic has added even more vulnerabilities to an already long list. Cybersecurity has become a core focus for healthcare leaders as more weaknesses are identified and exploited by bad actors.
A typical healthcare system might perform up to 22 different types of security risk assessments each year. In decentralized health systems, information gathered during assessments is most likely siloed and not necessarily actionable.
Looking to fill resource gaps on your IT team? A virtual CISO could be the answer – learn 3 reasons why you should consider hiring a vCISO service.