Looking to fill resource gaps on your IT team? A virtual CISO could be the answer – learn 3 reasons why you should consider hiring a vCISO service.
Are you looking to purchase vendor risk management software for your healthcare organization? Our fundamental guide outlines the features and functionality to look for when evaluating solutions, along with an expanded definition of what constitutes a “business associate” and the types of business data to be protected when working with third parties.
Learn how to prepare for your annual HIPAA compliance audit with 6 best practice tips from the team at ComplyAssistant.
A 2019 report found that over 40 percent of health care executives said artificial intelligence will be the technology with the highest impact on operational performance in the next 3 years. But AI is not just for clinical use.
Over the course of 2019, we covered a variety of security and compliance topics, including security risk audits, HIPAA compliance, employee compliance training, and executive leadership and IT governance.
Though these issues are still relevant going into a new decade, we predict a renewed – or even evolved – outlook on four specific areas of security and compliance strategy.
Have you heard the term GRC but not quite sure what it includes? Or how it relates to healthcare? To that end, we’ve put together this list of the top 5 things you need to know about governance, risk, and compliance.
“It’s not a matter of if. It’s a matter of when.” Have you heard this – or even said it yourself – when discussing cybersecurity matters at your healthcare organization?
Just like other operational and clinical areas of a healthcare system, the right metrics can help you understand current state in your compliance and security strategy and help guide decisions for how your organization should allocate funding for health IT projects related to governance, risk, and compliance.
But, where to begin? Using a quarterly governance report card is an efficient way to gather data and see trending over time. Start with our top seven metrics to gather on your report card:
The technology storm of the past three decades has made access to electronic protected health information (ePHI) easier, which benefits patient care in an ever-fragmented delivery system, but is bad for information security. Protected health information (PHI) can be found in virtually every corner of a healthcare system, concealed in unlikely places. With each new technology, acquisition, or merger comes new vulnerabilities that may remain unseen until the right assessments are performed to uncover them.
Struggling with staying on top of HIPAA? Our easy-to-use HIPAA IT compliance checklist will help you keep track of your administrative, technical and physical safeguards.