Use this checklist to ensure you have the required supporting documentation for a Meaningful Use Audit.
Error - something went wrong!
How to Prepare for Phishing Attacks
Understand the steps necessary to determine if your employees have the ability to recognize a phishing atta...
Other content in this Stream
CCPA Compliance: Where Do I Begin?
This in-depth resource, written by privacy expert David Holtzman, provides actionable best practices all organizations should consider in order to be ready for enforcement of the new CCPA legislation.
Sneak Peek of CynergisTek’s Presentations at HIMSS19
The annual HIMSS Global Conference & Exhibition is fast approaching. From February 11 to 15, Orlando, Florida, will be the home for over 45,000 professionals from 90 international locations....
Healthcare Privacy & Cybersecurity: Outlook for 2019
During this webinar, John Nye and David Holtzman discussed the emerging privacy and security issues they predicted to trend in the healthcare industry and how organizations should be preparing. Some o
HIV Data Exposed Online
Is GDPR Compliance Tougher Than HIPAA Compliance?
The 2019 Health Data Privacy Regulatory Outlook
HHS Seeks Feedback on Potential HIPAA Changes
Another State Announces a HIPAA Breach Settlement
Bankers Life Affected By Hacking Incident
Marti Arvin, VP of Audit Strategy, and Marianne McGee from Healthcare Info Security sat down to further discuss the hacking incident at Bankers Life.
Phishing Scams in Healthcare: A Persistent Threat
Why Contingency Planning for Vendor Data Disputes Is Critical
A Strong Message on Improper PHI Disclosure to News Media
Medical Devices: The Risks Go Beyond Security
Watch our latest webinar on medical device security hosted by David Finn, EVP of Strategic Innovation at CynergisTek, Cory Blacketer, Information Security Consultant – Medical Device Security at Cyner
Breach Settlement Has Unusual Penalty
Mobile Devices in the Healthcare Academic Medical Center: Why Are They So Difficult to Control?
In today’s healthcare environment, mobile devices are rampant. Controlling the nature and method of data stored on these devices is not easy in most industries – and mobile devices in the...
Medicaid Data Breach Trends: An Analysis
Texas Retirement Agency Portal Breach Affects 1.25 Million
Anthem Mega-Breach: Record $16 Million HIPAA Settlement
Aetna Hit With More Penalties for Two Breaches
HIPAA lets providers text patients, but is it secure?