- See How Your Cybersecurity Program Compares to Your Peers
Aggregated assessment scores from hundreds of facilities across the U.S. including from business associates to critical access hospitals, and large health systems to large academic medical centers.
- Discover the Average NIST Function Conformance
Based on the five Core Elements of the Framework: Identify, Protect, Detect, Respond and Recover
- Receive Strategies and Tactics to Address the Biggest Challenges in Cybersecurity
CynergisTek subject matter experts highlight the trends we saw and best practices to overcome those challenges.
- Understand Why Just Compliance Does Not Equate to Security
Several organizations have a lot of room for improvement against NIST CSF, yet passed when analyzed against HIPAA.
Other content in this Stream
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
CynergisTek's Senior Director, Security Services Operations David Rauschendorfer recently wrote a blog post describing several steps healthcare organizations should take to manage potential third-part
This checklist describes the top vulnerabilities we have found in healthcare organizations along with the action items that should be taken to address them.
CynergisTek offers a Vendor Security Management program that regularly assesses, monitors, and manages your vendors and requires each one to attest on the record to their compliance.
In this webinar, David Holtzman describes the actions to take if your business associate compromises your patients’ info, even if your agreement says that the BA will handle the breach notification.
Each third-party vendor relationship comes with a selection of risks that must be recognized in time. These third-party vendor risks are usually multi-dimensional because they extend across other...
Thus far in 2017, the Office for Civil Rights (OCR) has announced that they have negotiated settlements or levied penalties in seven cases that have resulted in covered entities and business...
Business associates pose one of the top security threats to healthcare organizations. Our infographic highlights several statistics that illustrate this.
Written by Amanda C. McGrath, Privacy Consultant at CynergisTek, Inc. HIPAA covered entities face numerous challenges in managing business partner relationships. Entities must identify every...
“A Few Steps for Better Vendor Management: A Lifecycle Approach to Vendor Security” Written by Mac McMillan for Becker’s Hospital Review CynergisTek CEO, Mac McMillan recently wrote an article for...