Compliance Tips

Hope for the Best, Expect the Worst, Plan Today

The evolution of the risk of successful cyberattacks has been evident since 2010—when the Affordable Care Act was signed and resulted in a transition from paper to electronic medical records. Healthcare organizations began implementing new electronic medical record applications to comply with meaningful use (MU) requirements. Over the years, MU has introduced new criteria with a heavy focus on interoperability among applications. The combination of MU efforts, merger and acquisition activity, and the pandemic-induced remote workforce have increased healthcare organizations’ risk profiles, remaining a prime target for cyberattackers to do what they do best.

Read More »

Are You Vulnerable? Dig into HIPAA Risk Assessment and Risk Management

Cybersecurity threats in healthcare have posed serious risks and challenges for years. As a result, the government recognized the need to regulate access to electronic protected health information, or ePHI. The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act were designed and implemented as national standards for the privacy of protected health information, the security of ePHI, and breach notification to consumers. These rules include risk assessment and risk management by covered entities.

Read More »