Chief Information Officer

News, Tips and Best Practices for Chief Information Officers

  • Measuring Progress: Expanding the Horizon | 2019 Annual Report

    Measuring Progress: Expanding the Horizon | 2019 Annual Report

    CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.

    Read More
  • Healthcare Privacy and Security Workshop in Dallas

    Healthcare Privacy and Security Workshop in Dallas

    We invite you to attend our free Healthcare Privacy and Security Workshop on Tuesday, June 25th in Dallas.

    Read More
  • Healthcare Privacy and Security Workshop in St. Paul

    Healthcare Privacy and Security Workshop in St. Paul

    We invite you to attend our free Healthcare Privacy and Security Workshop on Thursday, June 13th in St. Paul.

    Read More
  • CAPP Community Conference: Cybersecurity 2019

    CAPP Community Conference: Cybersecurity 2019

    It has long been a desire of ours to offer our customers an exclusive event that provides education, updates, and opportunities for networking and feedback as an extension of our CAPP Community....

    Read More
  • Healthcare Privacy and Security Workshop in Dayton

    Healthcare Privacy and Security Workshop in Dayton

    We invite you to attend our free Healthcare Privacy and Security Workshop on Thursday, April 25th in Dayton.

    Read More
  • The Future of Healthcare Security

    The Future of Healthcare Security

    The start of a new year causes us to reflect on the past year and determine both the current state of the industry as well as where we are heading. As 2018 began everyone poured over the 2017...

    Read More
  • Need Security Project Experts? Learn More About Our Strategic Staffing Services.

    Learn More
  • A Management Model To Address Medical Device Risks

    A Management Model To Address Medical Device Risks

    Would You Like a Wake-Up Call? Looking back, the December 2016 Food and Drug Administration’s Pre-Market and Post-Market Cybersecurity Management Guidance captured the attention of many medical...

    Read More
  • Keeping Up with the Changes in Health Tech

    Keeping Up with the Changes in Health Tech

    Read More
  • Pen Testing of HHS Units Reveals Weaknesses

    Pen Testing of HHS Units Reveals Weaknesses

    Read More
  • States Ascendant in Standards for Data Privacy and Cybersecurity: How to Prepare

    States Ascendant in Standards for Data Privacy and Cybersecurity: How to Prepare

    Read More
  • ONC Information Blocking Rule Raises Privacy and Security Concerns

    ONC Information Blocking Rule Raises Privacy and Security Concerns

    Read More
  • President's Proposed 2020 Budget: Impact on Cybersecurity

    President's Proposed 2020 Budget: Impact on Cybersecurity

    Read More
  • Guilty Plea in Rare HIPAA Criminal Case

    Guilty Plea in Rare HIPAA Criminal Case

    Read More
  • Data of 45,000 Rush patients exposed due to third-party breach

    Data of 45,000 Rush patients exposed due to third-party breach

    Read More
  • Documentation: The Necessary Evil of IT

    Documentation: The Necessary Evil of IT

    One of the most dreaded terms in the world of information technology and security (IT/IS) is “documentation”. Not because it isn’t massively helpful to everyone, or really for any reason other...

    Read More
  • The Top 9 Criteria Organizations Should Consider When Evaluating Medical Device Security

    The Top 9 Criteria Organizations Should Consider When Evaluating Medical Device Security

    Read our checklist to learn criteria every healthcare delivery organization should consider when evaluating their medical device security program to effectively mitigate risks.

    Read More
  • The Risks of Healthcare's Continued Dependence Upon Fax

    The Risks of Healthcare's Continued Dependence Upon Fax

    Read More
  • Healthcare security is improving, but don’t stop now

    Healthcare security is improving, but don’t stop now

    Read More
  • UConn Health Among the Latest Phishing Victims

    UConn Health Among the Latest Phishing Victims

    Read More
  • How Can Healthcare Protect Patient Data?

    How Can Healthcare Protect Patient Data?

    Read More
  • loading
    Loading More...