Use this checklist to ensure you have the required supporting documentation for a Meaningful Use Audit.
About the Author
Follow on Twitter Follow on Linkedin Visit Website More Content by CynergisTek, Inc.
Use this checklist to ensure you have the required supporting documentation for a Meaningful Use Audit.
About the Author
![]()
CynergisTek is a top-ranked cybersecurity consulting firm dedicated to serving the information assurance needs of healthcare. CynergisTek offers specialized services and solutions to help organizations achieve privacy, security, and compliance goals. The company has been recognized by KLAS in the 2016 and 2018 Cybersecurity reports as a top performing firm in healthcare cybersecurity, as well as the 2017 Best in KLAS winner for Cybersecurity Advisory Services.
Follow on Twitter Follow on Linkedin Visit Website More Content by CynergisTek, Inc.
May's Cyber Briefing topics include how to implement a technology solution successfully and updates on new privacy and compliance laws and what they change/impact.
April topics include current threats, current challenges surrounding patients' Right of Access, and the speed ransomware encrypts your files from CynergisTek thought leaders.
March 2022 Cyber Briefing hosted by Mac McMillan. Mac discusses threat actors and other key topics & trending news related to healthcare privacy, cybersecurity, IT audit, & compliance.
Mac McMillan discusses healthcare providers and their need to devote more resources to preventing cybersecurity attacks.
Mac McMillan, CEO of CynergisTek discusses cybersecurity attacks and breaches of the past few months as pointing up a key lesson for health system leaders.
Understand are the basic cyber hygiene practices that can drastically reduce your risk of being taken down by ransomware.
Adversary Validation discovers vulnerabilities with no disruption to network operations and allows your organization to remediate before the malicious hacker can exploit your environment.
This checklist explains the five important factors that will help you navigate through your staffing consideration. Read more today.
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
Read our checklist to learn criteria every healthcare delivery organization should consider when evaluating their medical device security program to effectively mitigate risks.
This checklist describes seven tips to keep in mind when presenting cybersecurity to your organization's senior management or Board.
This checklist describes the top vulnerabilities we have found in healthcare organizations along with the action items that should be taken to address them.
CynergisTek's Founder and CEO Mac McMillan is a defense intelligence veteran. Its Vice President of Cybersecurity Strategy, John Nye, served in the Army. At HIMSS 2018, the two told Healthcare Analyti
CynergisTek’s experts fulfill short- and long-term security and privacy roles to help healthcare organizations remediate, develop, and implement programs and technology.
Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.
The 7th Annual Breach Report examines breaches of PHI that occurred throughout 2016, the current state of cybersecurity and recommendations for strengthening privacy and security in healthcare.
Understand the steps necessary to determine if your employees have the ability to recognize a phishing attack and how to be prepared for one.
Use this checklist to determine if your policies, procedures, and on-going print security maintenance are vulnerable to threats.
While at AHIMA 2016, Healthcare Scene talked with Mac McMillan, CEO and Co-Founder of CynergisTek, about the role of HIM in healthcare privacy and security. We also asked Mac about privacy and securi
Mac McMillan interview with HealthITSecurity is quoted discussing the new year, ransomware operators will shift their focus away from encryption and on to data exfiltration.