Blog Listing

A Multifaceted Approach to Healthcare Breach Prevention
Listen in as Dai Snyder, Delegated Oversight Program Manager of the Care Coordination Institute (CCI), discusses her multifaceted breach prevention efforts.
Aligning Cloud Security and Privacy Tactics to Meet Cloud Compliance
The cloud has come a long way since its introduction, as have the tactics used to establish compliance, security, and privacy. So what’s changed? Find out in this post.
Achieving Full Interoperability in Healthcare: 6 Pathways For Forward-Thinking Organizations
The report “Sharing Data, Saving Lives: The Hospital Agenda for Interoperability" offers six pathways for accelerating interoperability at your organization.
9 Steps to Creating a Drug Diversion Monitoring Program
Drug diversion is a serious problem. But there are ways to combat the issue. Read this post for 9 steps to follow when creating a drug diversion monitoring program.
9 Quotes About Creating a Drug Diversion Program at Your Healthcare Facility
These insightful quotes from the webinar, "Addressing Drug Diversion in Healthcare: Where Do I Start?" can help you craft or further develop your drug diversion program.
8 Takeaways from the 2019 Cost of a Data Breach Report
Discover eight of the top takeaways from the recent 2019 Cost of a Data Breach Report from IBM and Ponemon Institute in this blog post.
How to prepare for an OCR HIPAA audit proactively
An OCR audit can happen at any time. Find out how to prepare for a HIPAA audit and strengthen your privacy and compliance program.
7 Insights from Cisco’s 2019 CISO Benchmark Study
CISOs have many areas of risk to consider. Here are the top seven takeaways from the 2019 CISCO CISO Benchmark study that can help inform your organization’s security posture.
6 Ways to Prevent Data Theft From Departing Employees
Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.
6 Independent Third-Party Sources for Vetting Cloud Security Vendors
How do you choose which vendors are doing their due diligence and offering you the most value? Trust these independent third-party sources when vetting cloud security vendors.
6 Healthcare Cybersecurity Best Practices for Protecting Patient Safety
Protecting sensitive health information is essential for HIPAA compliance and data breach prevention, but it can also impact patient safety. According to a recent study by Vanderbilt University,...
6 Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 1 of 2)
As a care provider, you can instill trust through a strong data privacy and security program. Here are six considerations for creating a comprehensive patient data privacy and security plan.
6 Cloud Security Challenges Facing CISOs in 2018 (and How CISOs are Surmounting The Challenges)
What must security and IT professionals look out for when managing their organizations’ cloud landscape? What cloud security challenges are CISOs facing in 2018? Find out in this blog post.
5 Ways to Gain Executive-Level Support for Building a Cybersecurity Program
You'll need executive buy-in if you want to successfully fund and build a robust cybersecurity program. Discover how you can gain leadership support in this blog post.
5 Ways to Create a Culture of Patient Data Privacy in Healthcare
Creating a culture of patient data privacy is critical for healthcare organizations. Find out, from the experts, how you can implement a culture of privacy from top to bottom in this article.
5 Ways One Financial Firm Strengthened Salesforce Data Security
United Capital was able to bolster their Salesforce security to protect sensitive customer financial data using these five methods. Find out what they are and how you can replicate their success here.
5 Types of Insider Threats in Healthcare – and How to Mitigate Them
Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them
Every financial organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
5 Things to Know About Data Privacy Compliance for CCPA and Beyond
There’s much to know about CCPA, but these five key takeaways regarding data privacy compliance will help ease your preparations for the new regulation.
5 sobering statistics related to drug diversion: What does it mean for Healthcare privacy and security?
Drug diversion is a severe concern in the healthcare industry. These statistics demonstrate the devastation this problem can have on communities and organizations.