The use of health information technology becomes more prevalent in healthcare every day. As with most things, this presents pros and cons. New technologies offer opportunities and benefits for consumers, but they also present risks to consumer privacy
Read more...
Critical applications, medical devices, protected health information (PHI), patient safety, and lives are all at risk when extended downtime occurs. The question is, are you and your team prepared?
Read more...
In a recent Health Financial Management Association article, our very own Gerry Blass gives voice to the importance of a commitment to cybersecurity.
Read more...
Healthcare data breaches occur almost every day and are becoming more frequent. Threat actors are continually shifting their tactics and targets relentlessly to stay ahead of the game. As a result, it is absolutely necessary that healthcare organizations respond to ever-changing cyber threats and implement technical safeguards that are current, comprehensive, and compliant.
Read more...
In the latest issue of the Journal of Health Care Compliance, our very own Gerry Blass outlines the essential steps you should take to implement a solid business continuity plan.
Read more...
How do you know that your electronic protected health information (ePHI) is secure? In today’s world, you can never be too careful. Read on to learn about HIPAA’s administrative safeguards.
Read more...
Partnering with ComplyAssistant for your risk register needs facilitates a bolstered defense for healthcare risk management and establishes complete insight into risks that threaten the security and prosperity of your organization. ComplyAssistant works in sync with your organization to identify risks and controls upfront, setting you and your team up for protection.
Read more...
In this article, we explore the framework for ComplyAssistant’s VRM capabilities and how it works to help businesses of every size identify and mitigate third-party risk.
Read more...
An article released by Gartner reported that by the year 2025, cyberattackers will have weaponized operational technology (OT) environments to successfully harm or kill humans. OT attacks, also known as attacks on hardware and software that monitors or controls equipment, assets, and processes, are on the rise. Consider the ransomware attack on the Colonial Pipeline, for example. Effects were felt up and down the East Coast, resulting in a payout of $4.4 million and damage to hospitals, emergency medical services, and law enforcement agencies.
Read more...
When looking for a new GRC software platform, it’s important to have one with all the latest features including task management, audits, and more.
Read more...