Skip to content

Category: HIPAA/HITECH Compliance Assurance

Read the latest articles and news from the world of cybersecurity.

How to complete your Security Risk Analysis for MIPS

MIPS or the Merit-based Incentive Payment System is a performance-based reimbursement program under Medicare, developed by the Centers for Medicare & Medicaid Services (CMS) to reward healthcare providers for quality,
Read More

Complying with HIPAA

The Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, is a U.S. federal law designed to protect PHI and other sensitive patient health information. HIPAA establishes the standards
Read More

What is the HIPAA Security rule?

The HIPAA Security rule applies to covered entities, business associates, subcontractors – anyone or any system with access to confidential patient data. Every organization in the healthcare delivery ecosystem must
Read More

Security Certifications for Startups

Investing in security certifications such as SOC 2 and ISO 27001 can benefit startups by bolstering their market credibility and competitive stance. For new companies, establishing trust with potential clients
Read More

Security Considerations for AI in Radiology

As the integration of Artificial Intelligence (AI) into radiology continues to advance, it brings forth a multitude of opportunities to enhance diagnostic accuracy, streamline workflows, and improve patient outcomes. However,
Read More

Cybersecurity and Compliance Best Practices for Radiology

In the rapidly evolving landscape of healthcare, the integration of technology has become indispensable, particularly in the field of radiology where digital systems are fundamental to diagnosis and treatment. However,
Read More

Benefits of Pen Testing for Radiology

Radiology organizations handle sensitive medical information and rely heavily on secure digital systems to store and transmit patient data. With the increasing prevalence of cyber threats, ranging from ransomware attacks
Read More

Pen Testing for Radiology

Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a proactive security assessment approach used to identify vulnerabilities and weaknesses within a computer system, network, or application.
Read More

Pen Testing versus Vulnerability Assessment

Feeling confused about security assessments? Are you unsure if a Vulnerability Assessment or Penetration Test is the right assessment for your organization? While both aim to test your defenses and
Read More

Can you have a Ransomware attack if you are HIPAA-compliant?

The short answer: Yes   The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health
Read More