In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
Risk management in healthcare involves assessing various factors that could lead to harm. Effective risk management primarily focuses on safeguarding patients and staff. Let’s dive a little deeper into this subject.
In this blog post we cover specifics of what risk management is. As well as strategies that can help keep your institution safe, and who exactly needs to abide by them.
What does a HIPAA risk assessment look like? Is there a specific template to follow? In this blog, we will go over what exactly a risk assessment is, why you need it, and steps to take to create your own risk assessment template.
To identify threats, improve your cybersecurity framework, and master risk management, you should follow a cybersecurity risk assessment checklist. If you don’t have one or aren’t familiar with making a checklist, take a look at our no-nonsense 6-step checklist!
We had the opportunity to interview Paul Hugenberg III, Founder and CEO of InfoGPS Networks, about the importance of risk management, the qualities of a good CISO, and when to outsource to a vCISO.