Evolving the Cybersecurity Landscape

At Fortified Health Security, we know that there are multiple factors that our industry must pay attention to as we look towards building robust cybersecurity programs. One of the most pressing factors is the rapid digitization of healthcare that was happening before the pandemic and is happening at a faster...

Fortified Health Security Announces New Addition to Executive Leadership Team

Fortified Health Security, the recognized leader in cybersecurity for healthcare, today announced the appointment of Dave Glenn as Chief Revenue Officer. A seasoned leader with over 30 years of combined experience in information technology, cybersecurity, enterprise sales and business development execution and leadership, Glenn joins Fortified Health Security’s executive leadership...

HIPAA Changes Regarding COVID-19: What Healthcare Organizations Should Know

In light of the COVID-19 pandemic, the Department of Health and Human Services (HHS) and the Office of Civil Rights (OCR) have issued a Limited Waiver of HIPAA Sanctions and Penalties. While HIPAA regulations and protected health information (PHI) protections are still in place, it’s important that healthcare facilities understand...

How to Maintain Cyber Security When Employees Work Remotely

With the spread of Covid-19 around the country, many organizations are sending employees home to work remotely. Doing so can be an essential health and safety precaution. However, remote work comes with additional cybersecurity threats. Here are some key ways that organizations can prioritize network security while employees are dispersed....

Do You Meet HIPAA’s 3 Areas of Security?

As the occurrence of cyber-attacks and data breaches continue to grow, medical providers find themselves tasked with adhering to an ever-increasing litany of HIPAA compliance requirements. Thus, strong cybersecurity program implementation and maintenance should remain a top priority for healthcare facilities of every size across the U.S. This is especially...

Benefits of Continuous HIPAA Analysis

Within the HIPAA Security Rule Administrative Safeguards, requirements include that covered entities “implement policies and procedures to prevent, detect, contain and correct security violations.” This standard requires both Risk Analysis and Risk Management which assist an organization's management in developing protections for confidentiality, integrity, and availability of ePHI within the...

Five Major Cybersecurity Threats to Your System – And How To Protect Against Them

Healthcare facilities continue to combat the threat of cyber attacks within their digital landscapes, forcing IT departments across the globe to continuously adjust their lines of defense against a network security compromise or data breach. The increasing complexity and sophistication of cybercriminal activities mean healthcare organizations must remain vigilant against...

Healthcare Security Incident and Event Management (SIEM): An Introduction to Capabilities

As healthcare organizations continue to embrace and rely on a diverse range of technologies to both manage and treat patients, their internal IT and cybersecurity environments continue to become more complex and challenge situational awareness. This rampant surge of innovation utilization is unlikely to change over the next several years...

Designating Number of Connected Medical Devices

Connected medical devices are being used in various capacities to resolve several issues currently plaguing the healthcare industry on a global scale. Once considered peripheral resources, due to new science and innovation, medical devices and Internet of Things (IoT) technologies have now become integrated into the very fabric of most...

How to Recover From a Healthcare Data Breach

Despite the healthcare industry's continuous efforts to minimize cybercriminal activity, cyber attacks continue to make their tumultuous presence known throughout the industry. As a result, medical facilities, providers, and payers have prioritized protecting their digital infrastructure against a data breach. Healthcare organizations are consistently implementing preventative measures such as update...

How A Virtual Information Security Program Revolutionizes Cybersecurity in Your Organization

Despite continuously integrating innovative cybersecurity upgrades and enhancements, the healthcare industry remains a primary target for cyber attacks and data breaches for a myriad of reasons. A medical facility's technology environment contains employee and provider information, financial data, as well as a full spectrum of highly sensitive patient information, all...

How to Conduct an Inventory of Your Medical Devices to Plan for Confident Cybersecurity

Connected medical devices have become an integral part of the patient experience here in the United States. Recent statistics demonstrate that a single hospital room may have, on average, 15-20 medical devices in it, many of them connecting directly into the healthcare facility's IT infrastructure. Beyond the number in each...

6 Recommendations for Taking Your Healthcare Information Management Systems from Compliance to Confidence

Cyber attacks are a regular occurrence throughout the healthcare industry. Unfortunately, not only are data nad network security compromises common, they are also costly. A cyberattack can cost the organization $1.4 million in recovery expenses alone on average, including loss of productivity, service disruption, and irreparable reputation damage for medical...

Maintaining Strong IT Security When Using Medical Devices

Connected medical devices have been around, in various capacities, for the last several decades. However, the current advancements in technology, coupled with Internet of Things (IoT) innovation, has officially and effectively redefined the impact and reliance on these devices throughout the healthcare industry. Seen as an emerging technology and enabler...