In light of the recent Premera breach, it’s a good time for businesses across all industries to take a step back and reconsider their security procedures. Despite regulations and security standards…
Performing a risk assessment for safeguarding electronic patient health information (ePHI) is part of complying with HIPAA regulations. Such an assessment is also a meaningful use requirement of the…
Complying with the HIPAA Security Rule is a complex undertaking because the rule itself has multiple elements. This checklist is not a comprehensive guide to compliance with the rule itself*, but…
This concerns improving critical infrastructure cybersecurity with recommendations on framework implementation within an organization, communicating about cybersecurity to stakeholders, approaches to…
Mobile health, or “mHealth” for short, is an increasingly popular topic of discussion among healthcare professionals. The concept is simple: patients can track, transmit and store health information…
This concerns improving critical infrastructure cybersecurity with recommendations on framework implementation within an organization, communicating about cybersecurity to stakeholders, approaches to…