In response to the latest attack on the healthcare industry by the cybercriminal group Orangeworm, Fortified Health Security COO William Crank penned a commentary for the Disaster Recovery Journal – the leading industry resource for business continuity professionals covering disaster recovery, crisis management, and risk management. Throughout the article, Crank discusses what healthcare leaders should know about… View ArticleRead More ›
News & Events
Catch up on the latest industry trends, Fortified news, or let’s meet at an upcoming event.
In light of the COVID-19 pandemic, the Department of Health and Human Services (HHS) and the Office of Civil Rights (OCR) have issued a Limited Waiver of HIPAA Sanctions and Penalties. While HIPAA regulations and protected health information (PHI) protections are still in place, it’s important that healthcare facilities understand what protocols the limited waiver… View ArticleRead More ›
With the spread of Covid-19 around the country, many organizations are sending employees home to work remotely. Doing so can be an essential health and safety precaution. However, remote work comes with additional cybersecurity threats. Here are some key ways that organizations can prioritize network security while employees are dispersed. Implement Network Access Control (NAC)… View ArticleRead More ›
As the occurrence of cyber-attacks and data breaches continue to grow, medical providers find themselves tasked with adhering to an ever-increasing litany of HIPAA compliance requirements. Thus, strong cybersecurity program implementation and maintenance should remain a top priority for healthcare facilities of every size across the U.S. This is especially true with data stored in… View ArticleRead More ›
Within the HIPAA Security Rule Administrative Safeguards, requirements include that covered entities “implement policies and procedures to prevent, detect, contain and correct security violations.” This standard requires both Risk Analysis and Risk Management which assist an organization’s management in developing protections for confidentiality, integrity, and availability of ePHI within the organization. The Risk Analysis implementation… View ArticleRead More ›