Compliance Tips

Risk Registers: Your First Line of Defense

Partnering with ComplyAssistant for your risk register needs facilitates a bolstered defense for healthcare risk management and establishes complete insight into risks that threaten the security and prosperity of your organization. ComplyAssistant works in sync with your organization to identify risks and controls upfront, setting you and your team up for protection.

Read more...

ComplyAssistant Partners to Offer PriSec Boot Camp to Help Prevent Information Losses and Cyberattacks

Just as we tell our clients that privacy and security is everyone’s responsibility, we also believe it’s our responsibility to help educate the industry about best practices for protecting critical data and infrastructure. To that end, ComplyAssistant has partnered with industry-leading companies to produce the PriSec Boot Camp. To help prepare professionals at all levels—from […]

Read more...

Operational Continuity – Cyber Incident Framework Available Upon Request

The Healthcare Public Health Sector Coordinating Councils (HSCC) recently published a document entitled “Operational Continuity – Cyber Incident” (OCCI) to assist organizations with the preparation and response to Cyber Incidents. In order to ensure ComplyAssistant clients and partners have access to the latest cyber tools available, it can be made available to active grc software […]

Read more...

Amid rising cyberattacks, a more discreet trend: EHR snooping

ComplyAssistant’s Gerry Blass comments on ways to mitigate rising cyberattacks in Fierce Healthcare’s “Amid rising cyberattacks, a more discreet trend: EHR snooping” article from March 7, 2022. “Though most systems are not likely to completely block access to medical records, they can include tools like break-the-glass, which offers a warning as a deterrent before allowing […]

Read more...

Mitigate Risk While Preparing for the Future: Why You Need a DRBC Plan

An article released by Gartner reported that by the year 2025, cyberattackers will have weaponized operational technology (OT) environments to successfully harm or kill humans. OT attacks, also known as attacks on hardware and software that monitors or controls equipment, assets, and processes, are on the rise. Consider the ransomware attack on the Colonial Pipeline, for example. Effects were felt up and down the East Coast, resulting in a payout of $4.4 million and damage to hospitals, emergency medical services, and law enforcement agencies.

Read more...