Compliance Tips

April 11, 2019   |   Ken Reiher

How a Functional Compliance Program Can Protect PHI

Before the digitization of healthcare records, protected health information (PHI) was mainly stored on paper charts and records and in data centers. The value of personal information was low. Now, however, ePHI is extremely valuable, and attackers will find a way in. As we way in the industry, “it’s not a matter of if. It’s when.” Healthcare organizations fend off tens of thousands of attacks every day.

Keep reading...
March 1, 2019   |   Ken Reiher

Shall We Play A Game?

Computer hackers have been around almost as long as computers themselves, but the risks to healthcare organizations are growing. On today’s episode, we explore cybersecurity in hospitals and health systems–what information hackers want, what to do after a breach occurs, and how to avoid one in the first place.

Keep reading...
January 23, 2019   |   Ken Reiher

Fundamental Guide to HIPAA Security Risk Assessments

Conducting regular HIPAA security risk assessments helps covered entities ensure compliance with HIPAA’s administrative, physical and technical safeguards, and helps expose areas where an organization’s protected health information (PHI) could be at risk.

Keep reading...
November 30, 2018   |   James Schroeder

Fundamental Guide to Compliance Management Software

Is your organization looking to purchase a compliance management software solution? Do you know what features and functionality to look for? ComplyAssistant’s Fundamental Guide to Compliance Management Software is your handbook for purchasing the right solution for your healthcare organization.

Keep reading...
August 14, 2018   |   Ken Reiher

A Guide To The NIST Cybersecurity Framework

Cyberattacks. It’s rare to turn on the news without hearing about a major organization that has become the victim of an online assault. Unfortunately, much more cybercrime is taking place under the media’s radar, and large corporations and national governments aren’t the only targets. Local governments, small business and healthcare organizations are prime targets for attackers.

Keep reading...