HIPAA Compliant Cloud Storage: How to Pick the Right Solution
As an MSP working with healthcare clients, you must consider compliance. This is because there are several areas in which you can interact with patient data. This [...]
As an MSP working with healthcare clients, you must consider compliance. This is because there are several areas in which you can interact with patient data. This [...]
In March 2022, President Joe Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This new law will likely trigger changes to the [...]
Establishing a healthcare cybersecurity policy is important for multiple reasons. Cybersecurity policies create standards for your staff, enabling them to keep sensitive information private. HIPAA requires healthcare [...]
Managing your organization’s cybersecurity is complex. Many fail to account for medical device security, forgetting that these devices connect to the internet, making them vulnerable. Medical device [...]
The HHS cybersecurity best practices serve as a guide healthcare organizations can adopt to improve their security posture. One of these best practices is security incident response. [...]
Vulnerability management is a crucial part of any cybersecurity program and is one of the Department of Health and Human Services recommended cybersecurity best practices. Specific to [...]
One of the HHS cybersecurity best practices recommends that organizations implement network management processes to improve data security. Network security in healthcare is more important than ever. [...]
As part of the practice of handling protected health information (PHI) during their regular duties, healthcare providers must take precautions to safeguard sensitive information. The Department of [...]
Healthcare organizations regularly handle patient information and must take precautions to safeguard sensitive data. Implementing HIPAA access controls and having an access management system reduces the likelihood [...]
As of September 23, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) added 225 additional vulnerabilities to its Known Exploited Vulnerability Catalog, bringing the total to 834. [...]