- compliance
- Cybersecurity
- healthcare
- vendor risk management
- business associates
- business associate agreements
- Hospital cybersecurity
- healthcare data breaches
- HHS OCR
- HIPAA Violations
- third-party vendors
- vendor risk assessment
- compliance
- Cybersecurity
- security risk assessment
- other
- HITRUST CSF
- HITRUST Framework
- Threat-Adaptive Framework
- security certification
- HITRUST Assessments
- compliance
- Cybersecurity
- HHS
- HIPAA
- information security
- nist
- nist csf
- OCR
- other
- business associates
- HITRUST CSF
- HIPAA Violations
- HITRUST Framework
- HITECH
- HR 7898
- Safe Harbor
- CSA of 2015
- Cybersecurity
- DontRiskItSecureIt
- CISO Services
- CIO
- compliance
- Cybersecurity
- information security
- other
- HITRUST cybersecurity framework
- HITRUST CSF
- HITRUST Framework
- HITRUST Validation Assessment
- HITRUST Readiness Assessment
- HITRUST One-Year Assessment
- HITRUST Two-Year Assessment
- HITRUST v11
- CSF v11
- HITRUST Essentials Assessment
- HITRUST Certification
- HITRUST 2023 Update
- Cybersecurity
- healthcare
- HIPAA compliance
- ePHI
- PHI
- protected health information
- security risk assessment
- vCISO
- HIPAA Privacy Rule
- hipaa security rule
- office for civil rights
- Hospital cybersecurity
- HHS OCR
- HIPAA Violations
- data privacy week
- HIPAA policies and procedures
- hospital procedures
- policies and proceures required by HIPAA
- Data breach notification rule
- compliance
- Cybersecurity
- Data privacy
- nist
- FTC
- HIPAA Privacy Rule
- PCI DSS
- privacy risk assessment
- data privacy week
- Consumer Privacy Rights
- Consumer Data Protection
- State Privacy Laws
- GLBA Financial Privacy Rule
- Data Privacy Laws
- federal privacy laws
- FERPA Privacy Rule
- Cybersecurity
- hackers
- ransomware
- phishing
- other
- pear tree
- compliance
- Cybersecurity
- Data privacy
- healthcare
- HIPAA compliance
- information security
- ePHI
- PHI
- protected health information
- HITRUST Validation Assessment
- HITRUST Readiness Assessment
- HITRUST Basic Assessment
- HITRUST One-Year Assessment
- HITRUST Two-Year Assessment
- compliance
- Cybersecurity
- Data privacy
- information security
- other
- ccpa
- gdpr
- privacy risk assessment
- Consumer Privacy Rights
- Consumer Data Protection
- Data Protection Assessment
- Online Transactions
- Information Use
- State Privacy Laws
- Consumer Data Privacy
- State Privacy Regulations
- Information Collection
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
February, 14 2023
Without vendor risk management, suppliers are one of the most loosely managed assets in healthcare Today, an increasing[…]
February, 7 2023
What it is, how it works, and why you want it The eagerly anticipated update to the HITRUST CSF Framework was announced[…]
January, 31 2023
By implementing security best practices, HR 7898 enables healthcare providers to potentially decrease enforcement[…]
January, 24 2023
Human judgment is frequently prejudiced.Decision-makers in cybersecurity often make biased judgments due to using[…]
January, 17 2023
HITRUST 2023 Update Delivers Six Important Improvements Plus a Brand New Assessment HITRUST is an information risk[…]
January, 10 2023
CISOs of healthcare organizations are responsible for policies and procedures that safeguard the security and privacy[…]
January, 3 2023
Virtually all organizations are governed by at least one privacy law, and yet compliance failures continue to[…]
December, 13 2022
In keeping with our popular holiday tradition, here are the famous 12 Days of Christmas with a cybersecurity twist![…]
December, 6 2022
Here’s help making the right decision for your healthcare organization Whether you operate a large hospital or a small[…]
November, 29 2022
Five states have enacted new regulations or amended laws to further protect the privacy of their residents’ personal[…]