- See How Your Cybersecurity Program Compares to Your Peers
Aggregated assessment scores from hundreds of facilities across the U.S. including from business associates to critical access hospitals, and large health systems to large academic medical centers.
- Discover the Average NIST Function Conformance
Based on the five Core Elements of the Framework: Identify, Protect, Detect, Respond and Recover
- Receive Strategies and Tactics to Address the Biggest Challenges in Cybersecurity
CynergisTek subject matter experts highlight the trends we saw and best practices to overcome those challenges.
- Understand Why Just Compliance Does Not Equate to Security
Several organizations have a lot of room for improvement against NIST CSF, yet passed when analyzed against HIPAA.
Error - something went wrong!
Other content in this Stream
A Summer of Data Breach Discontent
Managing Third Party Risk: CynergisTek’s Vendor Security Management
Measuring Progress: Expanding the Horizon | 2019 Annual Report
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
Five Best Practices to Improve Your Third-Party Risk Management Program
CynergisTek's Senior Director, Security Services Operations David Rauschendorfer recently wrote a blog post describing several steps healthcare organizations should take to manage potential third-part
The Top 20 Security Vulnerabilities Healthcare Organizations Should Address
This checklist describes the top vulnerabilities we have found in healthcare organizations along with the action items that should be taken to address them.
Vendor Security Management
CynergisTek offers a Vendor Security Management program that regularly assesses, monitors, and manages your vendors and requires each one to attest on the record to their compliance.
Investigating and Assessing Incidents Reported by a Vendor
What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially breached your patients’ sens
Health System Seeks Patients' Help to Mitigate Email Mishap
Five Best Practices to Improve Your Third-Party Vendor Risk Management Program
Each third-party vendor relationship comes with a selection of risks that must be recognized in time. These third-party vendor risks are usually multi-dimensional because they extend across other...
Business associates: Have you really integrated them into your risk profile?
OCR Enforcement Actions: Prioritize HIPAA Security & Vendor Management Requirements
Thus far in 2017, the Office for Civil Rights (OCR) has announced that they have negotiated settlements or levied penalties in seven cases that have resulted in covered entities and business...
Business Associate Risks in Healthcare
Business associates pose one of the top security threats to healthcare organizations. Our infographic highlights several statistics that illustrate this.
How to Develop a Diligent Vendor Management Program
Written by Amanda C. McGrath, Privacy Consultant at CynergisTek, Inc. HIPAA covered entities face numerous challenges in managing business partner relationships. Entities must identify every...
Tips for Better Vendor Management