Compliance

Assurance

Fortified Health Security’s Compliance Assurance services focus on creating a baseline understanding of our client’s current cyber security posture.

We partner with our clients to enhance their approach to cyber security through a tailored program that fits their individual needs.

Risk Analysis

HIPAA Risk Analysis is a rigorous, detailed identification and prioritization of key risks currently facing our healthcare partners. Our Risk Analysis explores the likelihood of a potential breach and its impact by assessing the physical, administrative and technical information security controls and safeguards outlined by the HIPAA Security Rule.

Read More ›
Audit Preparedness

Fortified will conduct a mock audit utilizing the HIPAA Security Rule, Privacy Rule, Breach Notification Rule in accordance with the OCR Audit Protocol. We will structure the engagement to be reflective of an actual audit, employing restrictive timelines for documentation submission as well as requiring detailed evidence of safeguard implementation.

Read More ›
Sensitive Information Discovery

Fortified’s Sensitive Information Discovery process will scan, locate, and secure sensitive data throughout your network. Through our partner’s TrueDLP Discovery module, we will locate, identify, and secure sensitive data throughout the network, proactively reducing data loss risk while providing visibility into potentially unsecured information.

Read More ›
Penetration Testing

Penetration testing is a proven methodology that replicates real-world attack scenarios through a consistent and reliable process that tests your IT infrastructure so that you can protect confidential data from today’s threats. We provide actionable reports and prioritized recommendations – all customized to your healthcare organization.

Read More ›
HITRUST Assessment

Quickly becoming the Gold Standard within the healthcare industry, a HITRUST Certification sets an organization heads and shoulders above their peers with regards to a functioning, sound security program. Covered Entities (CE) and Business Associates (BA) alike can benefit from the prescriptive nature of the Common Security Framework (CSF) controls, as outlined by the HITRUST Alliance.

Read More ›