Why Empowering the CISO is Important for Healthcare Information Security Risk Management
We are starting to see Chief Information Security Officers (CISOs) reporting outside of Information Technology (IT). This makes sense because the CISO needs to be able to audit the IT controls and give an unbiased report to senior management.
ComplyAssistant’s Solution for Third Party Vendor (BA) Security Risk Management Gains Traction!
“CEs are struggling to support their own internal security program and are not able to assess their third party BAs. We get it done for them”, says Gerry Blass, President & CEO of ComplyAssistant.
Visit ComplyAssistant in National Harbor, MD from March 26 – 29
ComplyAssistant executives Gerry Blass (President and CEO) and Ken J. Reiher (VP Operations) will be stationed at booth number 111
HIPAA-HITECH Security – Why Pay for “Nothing”?
We read about healthcare organizations that get fined by the OCR for basically doing nothing, meaning that they have a general lack of evidence of due diligence for HIPAA.
How to avoid HIPAA penalties based on some of the largest!
Reviewing some of the largest fines can help healthcare organizations learn how to avoid them should an incident occur. Many experts say that it isn’t IF an incident will occur, it’s WHEN.
Have you tested your breach response process?
Adding a cybersecurity tactical simulation test to an overall information security risk assessment is a must in today’s world. It is a sure bet that attacks and breaches will continue to occur and so the need for functional assessments, mitigation, awareness and response are key to protecting your organizations confidential information.
Third Party (BA) Contract and Privacy and Security Risk Management
The HITECH-OMNIBUS final rule stepped up the requirements and for both CEs and BAs and both must now include the new requirements in their information privacy and security risk analysis and management program.
ComplyAssistant Kicks Off Summer Webinar Series
ComplyAssistant kicked off its summer webinar series on June 22, 2016 with guest speaker Helen Oscislawski, founder of the Attorneys
Office of Civil Rights Phase 2 HIPAA Audit Protocols
Based on prior statements from the OCR and their recently distributed survey, the pool of audit candidates will be approximately 800 to start. These randomly selected organizations will be chosen using the National Provider Identifier database and other external sources.
Workforce Risk and the Evolution of the Breach of Protected Health Information (PHI)
Who would have thought back in 1990 that someone in China or Russia or anywhere would be able to steal health information in a hospital in Anytown USA and even hold it for ransom.
Back to the Future – Root cause of Information Security Breaches
Healthcare seems to be the #1 target for hackers and ransomware and there are two (2) main reasons that make up the root cause.
ComplyAssistant Announces Enhancements to its Cloud Compliance Management Portal
May 5, 2016 – Colts Neck, NJ – ComplyAssistant, a leader in healthcare compliance management solutions, announces new enhancements to