• Premera Breach Wake-up Call: Five Basics for Every Business

    In light of the recent Premera breach, it’s a good time for businesses across all industries to take a step back and reconsider their security procedures. Despite regulations and security standards…

  • Getting Started: EHR Risk Assessment

    Performing a risk assessment for safeguarding electronic patient health information (ePHI) is part of complying with HIPAA regulations. Such an assessment is also a meaningful use requirement of the…

  • HIPAA Security Checklist

    Complying with the HIPAA Security Rule is a complex undertaking because the rule itself has multiple elements. This checklist is not a comprehensive guide to compliance with the rule itself*, but…

  • FERPA security checklist

    This concerns improving critical infrastructure cybersecurity with recommendations on framework implementation within an organization, communicating about cybersecurity to stakeholders, approaches to…

  • Prepare your patients as mHealth moves into the security spotlight

    Mobile health, or “mHealth” for short, is an increasingly popular topic of discussion among healthcare professionals. The concept is simple: patients can track, transmit and store health information…

  • Tech Brief: Hacking Critical Infrastructure: Keeping our Nation Safe

    This concerns improving critical infrastructure cybersecurity with recommendations on framework implementation within an organization, communicating about cybersecurity to stakeholders, approaches to…