Risk Management

News, Tips and Best Practices for Reviewing or Implementing a Risk Management Program

  • Measuring Progress: Expanding the Horizon | 2019 Annual Report

    Measuring Progress: Expanding the Horizon | 2019 Annual Report

    CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.

    Read More
  • The Future of Healthcare Security

    The Future of Healthcare Security

    The start of a new year causes us to reflect on the past year and determine both the current state of the industry as well as where we are heading. As 2018 began everyone poured over the 2017...

    Read More
  • A Management Model To Address Medical Device Risks

    A Management Model To Address Medical Device Risks

    Would You Like a Wake-Up Call? Looking back, the December 2016 Food and Drug Administration’s Pre-Market and Post-Market Cybersecurity Management Guidance captured the attention of many medical...

    Read More
  • Keeping Up with the Changes in Health Tech

    Keeping Up with the Changes in Health Tech

    Read More
  • Pen Testing of HHS Units Reveals Weaknesses

    Pen Testing of HHS Units Reveals Weaknesses

    Read More
  • How Mature is Your Cybersecurity Program?

    Learn More
  • States Ascendant in Standards for Data Privacy and Cybersecurity: How to Prepare

    States Ascendant in Standards for Data Privacy and Cybersecurity: How to Prepare

    Read More
  • ONC Information Blocking Rule Raises Privacy and Security Concerns

    ONC Information Blocking Rule Raises Privacy and Security Concerns

    Read More
  • President's Proposed 2020 Budget: Impact on Cybersecurity

    President's Proposed 2020 Budget: Impact on Cybersecurity

    Read More
  • Data of 45,000 Rush patients exposed due to third-party breach

    Data of 45,000 Rush patients exposed due to third-party breach

    Read More
  • Documentation: The Necessary Evil of IT

    Documentation: The Necessary Evil of IT

    One of the most dreaded terms in the world of information technology and security (IT/IS) is “documentation”. Not because it isn’t massively helpful to everyone, or really for any reason other...

    Read More
  • The Top 9 Criteria Organizations Should Consider When Evaluating Medical Device Security

    The Top 9 Criteria Organizations Should Consider When Evaluating Medical Device Security

    Read our checklist to learn criteria every healthcare delivery organization should consider when evaluating their medical device security program to effectively mitigate risks.

    Read More
  • The Risks of Healthcare's Continued Dependence Upon Fax

    The Risks of Healthcare's Continued Dependence Upon Fax

    Read More
  • Healthcare security is improving, but don’t stop now

    Healthcare security is improving, but don’t stop now

    Read More
  • UConn Health Among the Latest Phishing Victims

    UConn Health Among the Latest Phishing Victims

    Read More
  • How Can Healthcare Protect Patient Data?

    How Can Healthcare Protect Patient Data?

    Read More
  • Medical Device Cyber Risk: An Enterprise Problem

    Medical Device Cyber Risk: An Enterprise Problem

    Read More
  • Cottage Health Hit With $3 Million HIPAA Settlement

    Cottage Health Hit With $3 Million HIPAA Settlement

    Read More
  • 102 women in health IT to know | 2019

    102 women in health IT to know | 2019

    Read More
  • EHR Vendor Greenway Gets Hefty Fine for False Claims

    EHR Vendor Greenway Gets Hefty Fine for False Claims

    Read More
  • Sneak Peek of CynergisTek’s Presentations at HIMSS19

    Sneak Peek of CynergisTek’s Presentations at HIMSS19

    The annual HIMSS Global Conference & Exhibition is fast approaching. From February 11 to 15, Orlando, Florida, will be the home for over 45,000 professionals from 90 international locations....

    Read More
  • loading
    Loading More...