The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities conduct a risk assessment of their healthcare organization. A risk assessment helps healthcare organizations ensure they are compliant with HIPAA’s administrative, physical, and technical safeguards. A risk assessment also helps reveal areas where protected health information (PHI) could be at risk.
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities to conduct a risk assessment annually to identify risks and vulnerabilities to electronic Protected Health Information (ePHI).
As with anything, there is misinformation about the HIPAA Security Rule and the required risk assessment. The following is are the top 10 myths of Security Risk Assessments. Read More
The convenience of digital technology offers a wide array of benefits and risks. Technology has opened many doors for senior living providers to advance care, reduce costs and improve their residents’ experience. However, when left unprotected, technology has also opened the door to new risks.
In 1996, Congress passed the Health Insurance Portability and Accountability Act (HIPAA) to help protect the use of patient information in electronic health record systems. Those same safeguards apply to data in the rapidly-evolving realm of telehealth. Read More
Penetration testing is important process for determining the strength of an organization’s IT security. However, the value of the process itself is determined by the thoroughness of the testing. In other words, not all penetration testing is created equally.
But let’s back up a bit and answer a few questions: