Compliance

HIPAA Privacy is About More Than Just Compliance
Josh Mayfield
HIPAA Privacy is About More Than Just Compliance

Nearly every healthcare IT professional I’ve spoken to is seriously overburdened when it comes to protecting patient privacy. From annual security assessments to following breach protocols and everything in between, maintaining HIPAA compliance requires more than most IT departments are resourced to handle. Top of mind for most healthcare administrators however is the reality of non-compliance. HIPAA violations vary widely in both cost and root cause. In 2017 for...

READ MORE
Econ 101: Absolute and Healthcare
Josh Mayfield
Econ 101: Absolute and Healthcare

If you’re keeping score, 2018 healthcare data breaches have passed 6.1 million so far. The Office for Civil Rights updated their ‘the wall of shame,’ last month with a new member—UnityPoint Health—when 1.4 million records were reported compromised on July 30. The investigation for PHI violations is ongoing. Yes, cybercriminals want to get their mitts on protected health information (PHI). We all know this. But PHI’s guardians—providers, payers, clearinghouses,...

READ MORE
NIST Cybersecurity Framework: Fifth, Iterate and Adapt
Josh Mayfield
NIST Cybersecurity Framework: Fifth, Iterate and Adapt

We come at last to the final stop on our journey to implement the NIST Cybersecurity Framework (CSF). In previous posts, we’ve looked at how to identify, protect, detect and respond to security risks. Here, with the final pillar of the NIST CSF, Recover, we get a chance to reflect on what has happened and incorporate that new knowledge to improve our people, process, and technology for greater cyber...

READ MORE
How Wichita State University Improved Endpoint Visibility & Control
Juanma Rodriguez
How Wichita State University Improved Endpoint Visibility & Control

Long gone are the days when institutional data sits within a single, secure perimeter. Sensitive information now resides on multiple mobile endpoints handled by users who are constantly making changes to them. As more and more higher education institutions adopt 1:1 device programs, the challenge of securing that data only amplifies. Wichita State University (WSU), a public university in Wichita, Kansas that serves about 15,000 students, has experienced a...

READ MORE
How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE