Is Electronic Protected Health Information (ePHI) Getting Outside Your Healthcare Organization?

Under HIPAA regulations, health information or data that can be used to identify an individual patient is categorized as protected health information (PHI) and must undergo a wide range of practices explicitly designed to protect patient confidentiality. Covered entities must implement processes and controls to ensure confidentiality, integrity, and availability...

6 Considerations for HIPAA Compliant Penetration Testing

Strategic and results-driven penetration testing (also known as pen testing) helps healthcare enterprises maintain the highest levels of network security across their entire organization. Often referred to as "ethical hacking," a penetration test examines an organization’s digital enterprise vulnerabilities and assesses those vulnerabilities through the same methods that a real-world...

Fortified Health Security: What Does It Mean to Be HITRUST-Certified

Healthcare providers across every specialty rely on high-performing technology to both treat and support their patients. Whether it's integrating a cloud-based CRM to automate back office functioning such as appointment scheduling or billing, or incorporating the latest, state-of-the-art connected medical devices into a treatment protocol, innovation is at the very...