Compliance

HIPAA Security Rule: Protecting Privacy and Improving Patient Care
Josh Mayfield
HIPAA Security Rule: Protecting Privacy and Improving Patient Care

In my previous post, we looked at the HIPAA Privacy Rule which mandates data protection of health information as a civil right. Boiling the rule down to its simplest form, HIPAA Privacy lays out what data requires protection and who is held accountable for keeping it confidential. However, it’s the HIPAA Security Rule that tells us how that data must be protected. Three Security Safeguard Categories The Security Rule...

READ MORE
HIPAA Privacy is About More Than Just Compliance
Josh Mayfield
HIPAA Privacy is About More Than Just Compliance

Nearly every healthcare IT professional I’ve spoken to is seriously overburdened when it comes to protecting patient privacy. From annual security assessments to following breach protocols and everything in between, maintaining HIPAA compliance requires more than most IT departments are resourced to handle. Top of mind for most healthcare administrators however is the reality of non-compliance. HIPAA violations vary widely in both cost and root cause. In 2017 for...

READ MORE
Econ 101: Absolute and Healthcare
Josh Mayfield
Econ 101: Absolute and Healthcare

If you’re keeping score, 2018 healthcare data breaches have passed 6.1 million so far. The Office for Civil Rights updated their ‘the wall of shame,’ last month with a new member—UnityPoint Health—when 1.4 million records were reported compromised on July 30. The investigation for PHI violations is ongoing. Yes, cybercriminals want to get their mitts on protected health information (PHI). We all know this. But PHI’s guardians—providers, payers, clearinghouses,...

READ MORE
NIST Cybersecurity Framework: Fifth, Iterate and Adapt
Josh Mayfield
NIST Cybersecurity Framework: Fifth, Iterate and Adapt

We come at last to the final stop on our journey to implement the NIST Cybersecurity Framework (CSF). In previous posts, we’ve looked at how to identify, protect, detect and respond to security risks. Here, with the final pillar of the NIST CSF, Recover, we get a chance to reflect on what has happened and incorporate that new knowledge to improve our people, process, and technology for greater cyber...

READ MORE
How Wichita State University Improved Endpoint Visibility & Control
Juanma Rodriguez
How Wichita State University Improved Endpoint Visibility & Control

Long gone are the days when institutional data sits within a single, secure perimeter. Sensitive information now resides on multiple mobile endpoints handled by users who are constantly making changes to them. As more and more higher education institutions adopt 1:1 device programs, the challenge of securing that data only amplifies. Wichita State University (WSU), a public university in Wichita, Kansas that serves about 15,000 students, has experienced a...

READ MORE