Shall We Play A Game?
Computer hackers have been around almost as long as computers themselves, but the risks to healthcare organizations are growing. On today’s episode, we explore cybersecurity in hospitals and health systems–what information hackers want, what to do after a breach occurs, and how to avoid one in the first place.
Security Risk Audits And Risk Mitigation Plans To Protect PHI
In today’s fast-paced world, there is no limit to the number of risk areas that can be identified during a security risk audit. And, performing the audit is not enough. Healthcare organizations must establish rigorous controls and governance to mitigate identified risks.
ComplyAssistant and PHIflow Launch Collaborative Solution for HIPAA Business Associate Risk Management
ComplyAssistant and PHIflow today announced a collaborative partnership to provide healthcare covered entities (CEs) with a comprehensive solution for the management of their HIPAA business associates (BAs).
What are HIPAA Security Risk Assessments? The Fundamental Guide
Conducting regular HIPAA security risk assessments helps covered entities ensure compliance with HIPAA’s administrative, physical and technical safeguards, and helps expose areas where an organization’s protected health information (PHI) could be at risk.
4 Free Tools for Healthcare Compliance Management
Because our healthcare compliance consultants have been in this industry for so long, we’ve been able to combine and share our expertise in these free healthcare compliance management tools, available 24/7 on our website.
What is Compliance Management Software? The Fundamental Guide
Is your organization looking to purchase a compliance management software solution? Do you know what features and functionality to look for? ComplyAssistant’s Fundamental Guide to Compliance Management Software is your handbook for purchasing the right solution for your healthcare organization.

Ensuring a solid medical device cybersecurity program
The need for appropriate medical device cybersecurity is critical. Healthcare organizations must protect their patients, and any sensitive data, by implementing and enforcing a solid medical device cybersecurity program.
What is Vendor Risk Management? The Fundamental Guide
This fundamental guide walks you through definitions, strategies, roadblocks and solutions to build a strategy that works for your organization.

5 Reasons To Take Your Healthcare Compliance Audits Mobile
If you’re still doing HIPAA audits the old-fashioned way with pen and paper, you’re missing out on valuable time savings, and you could be making critical errors in the back-end reporting of healthcare compliance audit information.
A Guide To The NIST Cybersecurity Framework
Cyberattacks. It’s rare to turn on the news without hearing about a major organization that has become the victim of an online assault. Unfortunately, much more cybercrime is taking place under the media’s radar, and large corporations and national governments aren’t the only targets. Local governments, small business and healthcare organizations are prime targets for attackers.
Data Breach Litigation: What You Need to Know
As sensitive data breaches become increasingly commonplace, many individuals are seeking to hold breached organizations responsible for the violation of their privacy. As a result, class- action lawsuits have emerged as a popular trend in the world of data breach litigation. With the rapid increase in this type of legal action, healthcare organizations must take measures to prevent data breaches. The first step to prevention is understanding why class-action lawsuits are on the rise as a response to data breaches.
ComplyAssistant Launches New Mobile Application for Healthcare Compliance
ComplyAssistant announced today the launch of its new mobile application to support risk management and healthcare compliance. The mobile application works in conjunction with ComplyAssistant’s leading governance, risk and compliance (GRC) software, enabling audit teams to become more efficient with managing, reporting and mitigating audit exceptions.