Michele Drake, Manager of Privacy Managed Services, explains how to monitor unauthorized access to medical records made by insiders and what information they may actually be looking for. Watch this video to learn more.
Other content in this Stream
How to Improve Your Patient Privacy Monitoring Program
CynergisTek’s Patient Privacy Monitoring Services
Measuring Progress: Expanding the Horizon | 2019 Annual Report
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
User Access Monitoring: Convincing Your Governing Body that You Need to do This
User access monitoring is a requirement under the HIPAA Security Rule. However, the specifics of what must be done remain a little cloudy. The regulations state, “implement hardware, software,...
Do you know who is accessing your organization's medical records?
Be prepared to get out the checkbook if you don’t have a robust, proactive patient privacy monitoring program. Insider snooping continues to be a huge threat to the security of patient information, a
Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule
Monitoring and auditing of access to protected health information by many organizations is prompted by patient complaints or some other event triggering the need to conduct an investigation. This...
Patient Privacy Monitoring Services
Our Patient Privacy Monitoring Services allows you to extend the depth and breadth of your privacy program’s monitoring and reporting capabilities.
Hospital Insider PHI Theft Case: Lessons to Learn
CynergisTek and Protenus Join Forces as Partners to Protect Patient Privacy
Top Cybersecurity Firm and Leading Healthcare Compliance Analytics Company Establish Preferred Partnership; Will Work Together to Help Health Systems Safeguard Patient Data Austin, TX – December...
Employees Suspended for Alleged Record Snooping
Insider Allegedly Steals Mental Health Data of 28,000 Patients
Ward off insider healthcare security threats with this tech
Inappropriate Access to Patient Records Spanned 14 Years
Our infographic highlights types of insider threats with stats on insider breaches, OCR settlements and security training.
Understanding and Reducing the Threat to Patient Privacy
Watch this webinar recording to learn about each of the top internal security threats and steps you can take to protect against them.
How to Optimize Your Privacy Program