Sharing Patient Information: Pros, Cons and Implications
The news late last year around Project Nightingale aroused interest from both healthcare organizations and the public on how and when protected health information (PHI) should be shared. With new technologies, new entrants to the healthcare market, how can healthcare providers balance HIPAA, cybersecurity protections, and the need to easily share data to improve patient care?
4 Reasons to Consider Virtual CISO Consulting Services
Looking to fill resource gaps on your IT team? Virtual CISO consulting services could be the answer – learn 4 reasons to consider hiring a vCISO
Fundamental Purchasing Guide for Vendor Risk Management Software
Are you looking to purchase vendor risk management software for your healthcare organization? Our fundamental guide outlines the features and functionality to look for when evaluating solutions, along with an expanded definition of what constitutes a “business associate” and the types of business data to be protected when working with third parties.
4 Security and Compliance Predictions for 2020
Over the course of 2019, we covered a variety of security and compliance topics, including security risk audits, HIPAA compliance, employee compliance training, and executive leadership and IT governance.
Though these issues are still relevant going into a new decade, we predict a renewed – or even evolved – outlook on four specific areas of security and compliance strategy.
5 Things to Know About Governance, Risk, and Compliance
Have you heard the term GRC but not quite sure what it includes? This is a list of the top 5 things you should know about governance, risk, and compliance.

HIPAA IT Compliance Checklist
Struggling with staying on top of HIPAA? Our easy-to-use HIPAA IT compliance checklist will help you keep track of your administrative, technical and physical safeguards.
Moving mountains: Why a healthcare compliance consultant might be your new best friend
Read on for 5 reasons to hire a consultant who can help you remove roadblocks and push your security and compliance strategy forward.

5 Reasons To Take Your Healthcare Compliance Audits Mobile
If you’re still doing HIPAA audits the old-fashioned way with pen and paper, you’re missing out on valuable time savings, and you could be making critical errors in the back-end reporting of healthcare compliance audit information.
Data Breach Litigation: What You Need to Know
As sensitive data breaches become increasingly commonplace, many individuals are seeking to hold breached organizations responsible for the violation of their privacy. As a result, class- action lawsuits have emerged as a popular trend in the world of data breach litigation. With the rapid increase in this type of legal action, healthcare organizations must take measures to prevent data breaches. The first step to prevention is understanding why class-action lawsuits are on the rise as a response to data breaches.
Building Your Medical Device Cybersecurity Protocol
Medical device cybersecurity has become significantly more important in the age of digital health. There are essential actions health systems must take to protect themselves – and their patients. This blog offers 5 guidelines to evaluate and maintain your medical device cybersecurity.
ComplyAssistant and Sensato Form Strategic Alliance
Colts Neck, NJ – July 24, 2017 – For Immediate Release – ComplyAssistant and Sensato, both located in New Jersey,
ComplyAssistant’s Solution for Third Party Vendor (BA) Security Risk Management Gains Traction!
“CEs are struggling to support their own internal security program and are not able to assess their third party BAs. We get it done for them”, says Gerry Blass, President & CEO of ComplyAssistant.