Patient Privacy Monitoring

New, Tips, and Best Practices Related to Patient Privacy Monitoring and Preventing Insider Breaches

  • Measuring Progress: Expanding the Horizon | 2019 Annual Report

    Measuring Progress: Expanding the Horizon | 2019 Annual Report

    CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.

    Read More
  • Expert Advice: How to Monitor Insider Access to Medical Records1:08

    Expert Advice: How to Monitor Insider Access to Medical Records

    Michele Drake, Manager of Privacy Managed Services, explains how to monitor unauthorized access to medical records made by insiders and what information they may actually be looking for.

    Watch Video
  • How to Improve Your Patient Privacy Monitoring Program1:38

    How to Improve Your Patient Privacy Monitoring Program

    Michele Drake, Manager of Privacy Managed Services, explains how CynergisTek takes a proactive approach to monitor clients' medical records and creating custom action plans to eliminate risks.

    Watch Video
  • CynergisTek’s Patient Privacy Monitoring Services0:30

    CynergisTek’s Patient Privacy Monitoring Services

    Watch Video
  • Optimize Your Privacy Monitoring Program

    Learn More
  • User Access Monitoring: Convincing Your Governing Body that You Need to do This

    User Access Monitoring: Convincing Your Governing Body that You Need to do This

    User access monitoring is a requirement under the HIPAA Security Rule. However, the specifics of what must be done remain a little cloudy. The regulations state, “implement hardware, software,...

    Read More
  • Do you know who is accessing your organization's medical records?1:01:14

    Do you know who is accessing your organization's medical records?

    This webinar helps you be prepared to get out the checkbook if you don’t have a robust, proactive patient privacy monitoring program.

    Watch Video
  • Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule

    Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule

    A guide to proactive access monitoring and auditing under the HIPAA security rule to help prevent patient complaints triggering the need to conduct an investigation.

    Read More
  • Patient Privacy Monitoring Services

    Patient Privacy Monitoring Services

    Our Patient Privacy Monitoring Services allows you to extend the depth and breadth of your privacy program’s monitoring and reporting capabilities.

    Read More
  • Hospital Insider PHI Theft Case: Lessons to Learn

    Hospital Insider PHI Theft Case: Lessons to Learn

    Read More
  • ×

    Subscribe to Our Monthly Cyber Bulletins with the Latest News, Tips and More!

    First Name
    Last Name
    Company
    State
    Thank You!
    Error - something went wrong!
  • CynergisTek and Protenus Join Forces as Partners to Protect Patient Privacy

    CynergisTek and Protenus Join Forces as Partners to Protect Patient Privacy

    Top Cybersecurity Firm and Leading Healthcare Compliance Analytics Company Establish Preferred Partnership; Will Work Together to Help Health Systems Safeguard Patient Data  Austin, TX – December...

    Read More
  • Employees Suspended for Alleged Record Snooping

    Employees Suspended for Alleged Record Snooping

    Read More
  • Insider Allegedly Steals Mental Health Data of 28,000 Patients

    Insider Allegedly Steals Mental Health Data of 28,000 Patients

    Read More
  • Ward off insider healthcare security threats with this tech

    Ward off insider healthcare security threats with this tech

    Read More
  • Inappropriate Access to Patient Records Spanned 14 Years

    Inappropriate Access to Patient Records Spanned 14 Years

    Read More
  • Insider Threats

    Insider Threats

    Our infographic highlights types of insider threats with stats on insider breaches, OCR settlements and security training.

    Read More
  • loading
    Loading More...