User Access Monitoring: Convincing Your Governing Body that You Need to do This
User access monitoring is a requirement under the HIPAA Security Rule. However, the specifics of what must be done remain a little cloudy. The regulations state, “implement hardware, software,...
Read More
Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule
A guide to proactive access monitoring and auditing under the HIPAA security rule to help prevent patient complaints triggering the need to conduct an investigation.
Read More
Hospital Insider PHI Theft Case: Lessons to Learn
Read More
CynergisTek and Protenus Join Forces as Partners to Protect Patient Privacy
Top Cybersecurity Firm and Leading Healthcare Compliance Analytics Company Establish Preferred Partnership; Will Work Together to Help Health Systems Safeguard Patient Data Austin, TX – December...
Read More
Employees Suspended for Alleged Record Snooping
Read More
Ward off insider healthcare security threats with this tech
Read More
Inappropriate Access to Patient Records Spanned 14 Years
Read More
Insider Threats
Our infographic highlights types of insider threats with stats on insider breaches, OCR settlements and security training.
Read More