Call Us Today! 1.800.704.3394|info@clearwatercompliance.com

Compliance and Information Risk Management Blog

Making the case for comprehensive cyber-risk strategies: 10 startling facts that will spur C-suite action

According to Jim Trainor, deputy assistant director of the FBI Cyber Division, “Major intrusions into healthcare providers’ computer systems now are happening at the pace of two or three a day.”

The largest healthcare data breach to date involved the insurance giant Anthem, in which about 80 million patient records were compromised. The cost of cleaning […]

By |August 8th, 2016|In the News|0 Comments

Building Capability and Capacity to Take on Healthcare’s Evolving Security Threats

Traditional approaches to patient safety and healthcare information security will need to evolve to address today’s emerging threats. The current risk environment for hospitals and healthcare organizations is changing quickly and includes a wide spectrum of threats — ranging from traditional intrusions designed to steal protected health information (PHI) to more novel and emerging attacks, […]

By |August 5th, 2016|Articles, In the News|0 Comments

It’s All About Risk Management! OCR Release Guidance on Ransomware – “Your Money or Your PHI”

The Office for Civil Rights (“OCR”) released guidance on July 11, 2016 regarding ransomware and HIPAA. This guidance outlines activities supported by HIPAA that will assist Covered Entities and Business Associated in either preventing or quickly responding to ransomware attacks. To illustrate, the guidance calls for:

Implementing a security management process, including conducting a risk analysis […]

By |August 2nd, 2016|Blog|0 Comments

What Happened to Meaningful Use Stage 3? Become Familiar With The Medicare and CHIP Reauthorization Act (MACRA)

Centers for Medicare and Medicaid Services (CMS) says Meaningful Use (MU) will live on in MACRA. If you thought Stage 3 of the Electronic Health Record (EHR) Incentive Program was being consigned to the regulatory ether given the newly proposed Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) rule, time for some new thinking.

CMS […]

By |July 28th, 2016|Uncategorized|0 Comments

Cyber Contagions Knock Out Hospital Systems — Prompting Triaging of Cybersecurity to Code Red Status

Typically, when hospitals declare emergencies, it’s for incoming patients—not their own internal computer systems. But, in March 2016, Methodist Hospital in Henderson, Kentucky, declared an emergency.

After being hit by a ransomware infection, the hospital placed a scrolling red alert on its homepage stating: “Methodist Hospital is currently working in an Internal State of Emergency due […]

By |July 19th, 2016|Blog|0 Comments

Exclusive Webinar for American Hospital Association (AHA) Members

On July 27th, 2016, OCR HIPAA investigator will share insider’s view of Office for Civil Rights (OCR) Phase 2 Audit readiness

OCR allows 10 days to respond to a Phase 2 audit request. Are there still gaps in your HIPAA compliance program?   

Similar to Phase 1, the Phase 2 audit protocol includes a comprehensive review of […]

By |July 12th, 2016|Blog|0 Comments

Clearwater Compliance Prepares to Unveil a New Version of IRM|Pro™ Software Suite

Not Just Another Pretty Face!

Within a few weeks, Clearwater will be unveiling new versions of our IRM|Analysis™, IRM|Security™, and IRM|Privacy™ software products designed with enhanced workflow and streamlined efficiency in mind.

The abundance of content and features contained within our suite of advanced, powerful software tools have evolved to the point that we wanted to provide […]

By |June 30th, 2016|Blog|0 Comments

Studies Show CEOs Unwilling to Take Responsibility for Cybersecurity

Who’s Responsible for Cybersecurity? Industry Searches for Clear Answers

We’re now living in what has been called the “era of the mega breach.” Globally, businesses are estimated to lose $445 billion annually due to cybercrime, according to the Center for Strategic and International Studies. What’s more, the overall threat landscape has evolved significantly with respect to […]

By |June 22nd, 2016|Blog|0 Comments

Preview : A Simpler And Better Alternative To The HITRUST Mandate For Third Party Risk Management In Healthcare

Guest post contributed by: Kamal Govindaswamy CISSP, CIPP/US, CCSP   Principal, RisknCompliance Consulting Group

I have written my opinion about HITRUST CSF/RMF and the HITRUST certification mandate starting with my first open letter to the HITRUST Alliance last fall, and subsequently – second and third letters.

More recently, I have been thinking about an alternative approach to […]

By |June 16th, 2016|Blog|0 Comments

Bipartisan House Bill to Create Separate Office of the CISO

A proposed bill to establish the Chief Information Security Officer (CISO) as an organizational peer to the Chief Information Officer (CIO) at the Department of Health and Human Services (HHS) will drive cybersecurity concerns to the top of the list.  If the bill passes, the CISO would have clear separation of duties from the CIO […]

By |June 13th, 2016|Blog|0 Comments