Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

The Paradigm Shift from ‘If’ to ‘When’: Ransomware Prevention and Mitigation Strategies for Your Healthcare Organization

The Paradigm Shift from ‘If’ to ‘When’: Ransomware Prevention and Mitigation Strategies for Your Healthcare Organization

Ransomware attacks on healthcare organizations are increasing and, unfortunately, they are also becoming incredibly more costly.
The ESG Movement & Cybersecurity

The ESG Movement & Cybersecurity

Investing in a comprehensive ECRM program that will ultimately prevent avoidable ransomware attacks and breaches, and subsequent harm to patients, must become a front-and-center objective of the ESG program.
Making it Easier to Identify Your Most Critical Risks

Making it Easier to Identify Your Most Critical Risks

IRM|Analysis doesn’t just identify risks; it tells you which risks matter most to your organization based on a range of artificial intelligence and machine learning inputs so you know which ones you should focus on fixing first. Learn more about how to automate, simplify, and quantify your risk analysis process.
Quantifying Vendor Risk and the Financial Impact a Vendor Breach Can Have on Your Organization

Quantifying Vendor Risk and the Financial Impact a Vendor Breach Can Have on Your Organization

The inability to adequately predict, quantify and understand the economic impact that vendors pose to healthcare providers has become a major issue as third-party data breaches grow in frequency and severity.
Business Associate to Business Associate: Selecting an Information Security and Privacy Framework

Business Associate to Business Associate: Selecting an Information Security and Privacy Framework

Specifically focused on business associates and their obligations to customers and HIPAA when it comes to selecting an information security and privacy framework.
8 Key Terms to Drive a Productive Dialogue About Enterprise Cyber Risk Management

8 Key Terms to Drive a Productive Dialogue About Enterprise Cyber Risk Management

In order to have a meaningful and productive conversation about cyber risk and cybersecurity, everyone at the table needs to be able to speak with precision and understand the differences between a risk, a vulnerability, and a threat, among other terms.
The Realities and Legalities of Risk Analysis and Risk Management in Healthcare

The Realities and Legalities of Risk Analysis and Risk Management in Healthcare

Managing risk across your healthcare enterprise comes with many challenges, but the benefits of shoring up your risk management processes to support your data security and privacy program cannot be overlooked.
Penetration Testers Offer Real-World Advice About Threats, Securing Your Healthcare Organization

Penetration Testers Offer Real-World Advice About Threats, Securing Your Healthcare Organization

Today’s modern threat landscape is constantly evolving. Determined, opportunistic, and well-resourced threat actors continue to develop tools, tactics and techniques aimed at gaining access to systems, stealing data, and/or installing ransomware.
Business Associate to Business Associate: A CISO’s Perspective on Applying Controls to Identified Risks

Business Associate to Business Associate: A CISO’s Perspective on Applying Controls to Identified Risks

Thoughtful selection, implementation, management, and monitoring of technical controls is required for ongoing risk management hygiene.
Encompass Health Automates Its HIPAA Compliant Risk Assessment & Strengthens Security Risk Management

Encompass Health Automates Its HIPAA Compliant Risk Assessment & Strengthens Security Risk Management

Clearwater partnered with Encompass Health to implement its enterprise Risk Analysis and Cyber Risk Management ...
Carrying Out a HIPAA Corrective Action Plan

Carrying Out a HIPAA Corrective Action Plan

What the University of Rochester Medical Center Learned From the Process Originally published by ISMG Mark ...
HR 7898: More Incentive for Healthcare Entities to Adopt Cybersecurity Best Practices

HR 7898: More Incentive for Healthcare Entities to Adopt Cybersecurity Best Practices

This new law requires the U.S. Department of Health and Human Services (HHS) to consider a healthcare entity's adoption of cybersecurity best practices when determining the length and outcome of audits or the amount of fines or extent of penalties it will impose.

Newsletter

Sign up to receive our monthly newsletter featuring resources curated specifically to your concerns.


Featured Resource