Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Why Resilience is Not Enough for Today’s Healthcare Cybersecurity and Privacy Programs

Why Resilience is Not Enough for Today’s Healthcare Cybersecurity and Privacy Programs

We now have examples of cyberattacks that have directly impacted patient safety and even include allegations of attacks resulting in patient deaths.
Understanding Business Processes and Critical Capabilities: A Closer Look at Business Impact Analysis with U.S. Anesthesia Partners

Understanding Business Processes and Critical Capabilities: A Closer Look at Business Impact Analysis with U.S. Anesthesia Partners

COVID-19 changed the world as most of us know it, both personally and professionally. And few industries may have felt the breadth of its impact as those in healthcare.
Making Every Month Cybersecurity Awareness Month

Making Every Month Cybersecurity Awareness Month

October’s Cybersecurity Awareness Month is a great time to promote cyber hygiene best practices throughout your organization.
Cyber Risk and Patient Safety: A Tragic Call to Arms

Cyber Risk and Patient Safety: A Tragic Call to Arms

A lawsuit has been filed against an Alabama hospital alleging that the medical team’s inability to access critical fetal monitoring data and devices during a 2019 ransomware attack led to a baby’s death.
Navigating Today’s Rapidly Evolving Cyber Insurance Market

Navigating Today’s Rapidly Evolving Cyber Insurance Market

As we’ve learned over the past year, any healthcare organization with protected health information (PHI), personally identifiable information (PII), and other sensitive data is at risk.
Risk Analysis and Risk Management Fuel Strong Security and HIPAA Compliance Programs

Risk Analysis and Risk Management Fuel Strong Security and HIPAA Compliance Programs

Risk Analysis and Risk Management Fuel Strong Security and HIPAA Compliance Programs
Effective Network Segmentation Strategies to Fend Off Cyberattacks

Effective Network Segmentation Strategies to Fend Off Cyberattacks

Once you implement network segmentation, you may discover some things you didn’t already know about your network.
Let the Buyer Beware: The Need for HIPAA Risk Analysis in Healthcare M&A Transactions

Let the Buyer Beware: The Need for HIPAA Risk Analysis in Healthcare M&A Transactions

Introduction Healthcare mergers, acquisitions, and joint venture partnerships have surged in recent years, ...
The Paradigm Shift from ‘If’ to ‘When’: Ransomware Prevention and Mitigation Strategies for Your Healthcare Organization

The Paradigm Shift from ‘If’ to ‘When’: Ransomware Prevention and Mitigation Strategies for Your Healthcare Organization

Ransomware attacks on healthcare organizations are increasing and, unfortunately, they are also becoming incredibly more costly.
The ESG Movement & Cybersecurity

The ESG Movement & Cybersecurity

Investing in a comprehensive ECRM program that will ultimately prevent avoidable ransomware attacks and breaches, and subsequent harm to patients, must become a front-and-center objective of the ESG program.
Making it Easier to Identify Your Most Critical Risks

Making it Easier to Identify Your Most Critical Risks

IRM|Analysis doesn’t just identify risks; it tells you which risks matter most to your organization based on a range of artificial intelligence and machine learning inputs so you know which ones you should focus on fixing first. Learn more about how to automate, simplify, and quantify your risk analysis process.
Quantifying Vendor Risk and the Financial Impact a Vendor Breach Can Have on Your Organization

Quantifying Vendor Risk and the Financial Impact a Vendor Breach Can Have on Your Organization

The inability to adequately predict, quantify and understand the economic impact that vendors pose to healthcare providers has become a major issue as third-party data breaches grow in frequency and severity.

Newsletter

Sign up to receive our monthly newsletter featuring resources curated specifically to your concerns.


Featured Resource