Patient Privacy Monitoring

New, Tips, and Best Practices Related to Patient Privacy Monitoring and Preventing Insider Breaches

  • Measuring Progress: Expanding the Horizon | 2019 Annual Report

    Measuring Progress: Expanding the Horizon | 2019 Annual Report

    CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.

    Read More
  • CAPP Community Conference: Cybersecurity 2019

    CAPP Community Conference: Cybersecurity 2019

    It has long been a desire of ours to offer our customers an exclusive event that provides education, updates, and opportunities for networking and feedback as an extension of our CAPP Community....

    Read More
  • User Access Monitoring: Convincing Your Governing Body that You Need to do This

    User Access Monitoring: Convincing Your Governing Body that You Need to do This

    User access monitoring is a requirement under the HIPAA Security Rule. However, the specifics of what must be done remain a little cloudy. The regulations state, “implement hardware, software,...

    Read More
  • Do you know who is accessing your organization's medical records?1:01:14

    Do you know who is accessing your organization's medical records?

    Be prepared to get out the checkbook if you don’t have a robust, proactive patient privacy monitoring program. Insider snooping continues to be a huge threat to the security of patient information, a

    Watch Video
  • Optimize Your Privacy Monitoring Program

    Learn More
  • Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule

    Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule

    Monitoring and auditing of access to protected health information by many organizations is prompted by patient complaints or some other event triggering the need to conduct an investigation. This...

    Read More
  • Patient Privacy Monitoring Services

    Patient Privacy Monitoring Services

    Our Patient Privacy Monitoring Services allows you to extend the depth and breadth of your privacy program’s monitoring and reporting capabilities.

    Read More
  • Hospital Insider PHI Theft Case: Lessons to Learn

    Hospital Insider PHI Theft Case: Lessons to Learn

    Read More
  • CynergisTek and Protenus Join Forces as Partners to Protect Patient Privacy

    CynergisTek and Protenus Join Forces as Partners to Protect Patient Privacy

    Top Cybersecurity Firm and Leading Healthcare Compliance Analytics Company Establish Preferred Partnership; Will Work Together to Help Health Systems Safeguard Patient Data  Austin, TX – December...

    Read More
  • Employees Suspended for Alleged Record Snooping

    Employees Suspended for Alleged Record Snooping

    Read More
  • ×

    Subscribe to Our Monthly Cyber Bulletins with the Latest News, Tips and More!

    First Name
    Last Name
    Company
    State
    Thank You!
    Error - something went wrong!
  • Insider Allegedly Steals Mental Health Data of 28,000 Patients

    Insider Allegedly Steals Mental Health Data of 28,000 Patients

    Read More
  • Ward off insider healthcare security threats with this tech

    Ward off insider healthcare security threats with this tech

    Read More
  • Inappropriate Access to Patient Records Spanned 14 Years

    Inappropriate Access to Patient Records Spanned 14 Years

    Read More
  • Insider Threats

    Insider Threats

    Our infographic highlights types of insider threats with stats on insider breaches, OCR settlements and security training.

    Read More
  • Understanding and Reducing the Threat to Patient Privacy

    Understanding and Reducing the Threat to Patient Privacy

    Watch this webinar recording to learn about each of the top internal security threats and steps you can take to protect against them.

    Read More
  • How to Optimize Your Privacy Program

    How to Optimize Your Privacy Program

    Mac McMillan shares ways you can alleviate some of the technical and administrative burdens that many providers face, as well as how to address the challenge of limited resources.

    Read More
  • loading
    Loading More...