CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizati...
Other content in this Stream
Our third annual report, Moving Forward: Setting the Direction, our analysts combed through data of the nearly 300 assessments performed to show the state of healthcare security in 2020.
Security issues are becoming a greater risk for businesses, patient care and safety, and fiscal operations and should be a concern to all organizations. Read our latest white paper to learn more.
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
This checklist describes the top vulnerabilities we have found in healthcare organizations along with the action items that should be taken to address them.
CynergisTek's Founder and CEO Mac McMillan is a defense intelligence veteran. Its Vice President of Cybersecurity Strategy, John Nye, served in the Army. At HIMSS 2018, the two told Healthcare Analyti
CynergisTek’s experts fulfill short- and long-term security and privacy roles to help healthcare organizations remediate, develop, and implement programs and technology.
Our incident responses (IR) services will help improve your organization’s ability to respond and recover from a cyber incident ranging from an attack or breach to an EMR outage.
Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.
CynergisTek provides a large selection of cybersecurity services that can be offered as a standalone engagement or as part of a managed service designed to fit your needs.
CynergisTek offers a Vendor Security Management program that regularly assesses, monitors, and manages your vendors and requires each one to attest on the record to their compliance.
Learn why healthcare leaders turn to CynergisTek for trustworthy and reliable support in cybersecurity, privacy, compliance, and information management expertise.
The 7th Annual Breach Report examines breaches of PHI that occurred throughout 2016, the current state of cybersecurity and recommendations for strengthening privacy and security in healthcare.
Understand the steps necessary to determine if your employees have the ability to recognize a phishing attack and how to be prepared for one.
Use this checklist to ensure you have the required supporting documentation for the Meaningful Use Audit.
Use this checklist to determine if your policies, procedures, and on-going print security maintenance are vulnerable to threats.
David Holtzman presents the Meaningful Use requirements, breaks down the audit process, and provides guidance on how organizations can prepare for a CMS meaningful use audit.