- See How Your Cybersecurity Program Compares to Your Peers
Aggregated assessment scores from hundreds of facilities across the U.S. including from business associates to critical access hospitals, and large health systems to large academic medical centers.
- Discover the Average NIST Function Conformance
Based on the five Core Elements of the Framework: Identify, Protect, Detect, Respond and Recover
- Receive Strategies and Tactics to Address the Biggest Challenges in Cybersecurity
CynergisTek subject matter experts highlight the trends we saw and best practices to overcome those challenges.
- Understand Why Just Compliance Does Not Equate to Security
Several organizations have a lot of room for improvement against NIST CSF, yet passed when analyzed against HIPAA.
Error - something went wrong!
Attacking Your Own Network: A Lesson on Penetration Testing for Healthcare
On the Ides of March, or very close to it on March 7th, I will take the HIMSS 2018 stage with Chuck Kesler,...
Other content in this Stream
Are State AGs Picking Up Slack in HIPAA Enforcement?
David Holtzman was recently interviewed by Marianne Kolbasuk McGee of Information Security Media Group about The Arc of Erie County lawsuit which encountered a data breach that impacted more than...
Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’
Healthcare Cybersecurity: Helping the Little Guy
OCR Updates Audit Protocol Emphasizing its Role for Compliance
The US Department of Health and Human Services, Office for Civil Rights (OCR) has without fanfare updated its comprehensive audit protocol, making substantive changes to inquiries to demonstrate...
WHA Emergency Prep Conference: Cybersecurity in Health Care, October 23
5 Pitfalls to Avoid When Considering Security Staff Benchmarks
California’s New Privacy Law Will Impact Health Care Across the Country
Records Snooping Alleged in Tragic Death of Toddler
Protecting Patient Information from Increased Cybersecurity Threats
Best Practices for HIPAA Compliance
Incident Response Planning: Paying NOT to Play
If you’re reading this, I probably don’t need to tell you that an incident response plan is the best way to prepare for that information security or other cyber incident – from attack, to...
HHS OIG Finds Security Flaws in Maryland's Medicaid System
Should Staff Ever Use Personal Devices to Access Patient Data?
How to assess IoT risks that fly under the radar
Web Application Penetration Testing
I have been writing about penetration testing and its related skills for some time now but haven’t yet taken a good deep dive into web application penetration testing. In many ways, web...
300,000 Records Found at Hospital Slated for Demolition
KLAS’s Recent Report on Cybersecurity Services Firms: What Are the Implications for HIT Leaders?
Ransomware Attack Leads to Discovery of Lots More Malware
Ransomware has impacted several different healthcare organizations over the past few weeks, including Allied Physicians of Michiana and LabCorp. The latest victim is Blue Springs Family Care. I...
Is HIPAA Enforcement Winding Down?
HHS Weighs Changes to Health Data Privacy Regulations