Compliance Tips

How to Improve Cyber Security for Healthcare

Technology and healthcare are now intricately connected. Technology has helped healthcare operators diagnose diseases in more detail and with more automation. It also helps you run your healthcare organization using information technology.  However, opportunities also come with risks. In terms of the healthcare industry, cybersecurity threats, unauthorized system access and data corruption run rampant. It’s […]

Read more...

ISO Vs. NIST: Similarities and Differences

Businesses must have frameworks and benchmarks to align their work with. This is especially true when it comes to digital security.  There are two important guidelines toward this aim: the NIST (National Institute of Standards and Technology) cybersecurity framework (CSF) and the ISO (International Organization for Standardization) CSF.  But what are these two frameworks, and […]

Read more...

Why Is Third Party Risk Management Important For Healthcare Compliance?

Working with third party vendors to provide services is nothing new. Yet a focus on vendor risk management has recently emerged. This is partially due to compliance, cybersecurity, and productivity. But in this post, we’ll answer the question, “Why is vendor risk management important?” And we’ll share some powerful ways to manage your third-party risk, […]

Read more...

How Has Technology Impacted Healthcare? 5 Insights

Technology is making a large impact for healthcare in today’s day and age. But how has technology affected healthcare compliance? While technology can help you maintain organizational KPIs, it also has unique challenges that you might face. So in this article, let’s talk about five ways that technology is impacting healthcare compliance. How Technology Has […]

Read more...

5 Tips for Preventing Healthcare System Cyberattacks

ComplyAssistant’s Gerry Blass comments on managing vendor relationships with due diligence and the importance of cybersecurity breach response plans in Digital Health Insight’s “5 Tips for Preventing Healthcare System Cyberattacks” article from January 11, 2023. Manage vendor relationships with due diligence: “Outsourcing is pivotal to a growing organization, but it’s important to vet the organizations […]

Read more...

Hope for the Best, Expect the Worst, Plan Today

The evolution of the risk of successful cyberattacks has been evident since 2010—when the Affordable Care Act was signed and resulted in a transition from paper to electronic medical records. Healthcare organizations began implementing new electronic medical record applications to comply with meaningful use (MU) requirements. Over the years, MU has introduced new criteria with a heavy focus on interoperability among applications. The combination of MU efforts, merger and acquisition activity, and the pandemic-induced remote workforce have increased healthcare organizations’ risk profiles, remaining a prime target for cyberattackers to do what they do best.

Read more...

Are You Vulnerable? Dig into HIPAA Risk Assessment and Risk Management

Cybersecurity threats in healthcare have posed serious risks and challenges for years. As a result, the government recognized the need to regulate access to electronic protected health information, or ePHI. The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act were designed and implemented as national standards for the privacy of protected health information, the security of ePHI, and breach notification to consumers. These rules include risk assessment and risk management by covered entities.

Read more...