Email Alerts
-
HIPAA compliance: New regulations change the game
Recent changes to HIPAA regulations coupled with renewed HIPAA enforcement may stir a panic among enterprise security teams charged with safeguarding PHI. Not so, according to security management expert David Mortman. Learn how HIPAA has changed and ... Tip
-
Key elements of a HIPAA compliance checklist
Putting together a HIPAA compliance program can be fraught with difficulty and unseen challenges. Richard Mackey reviews four best practices that can help you avoid common pitfalls and pass an audit. Tip
-
HIPAA privacy regulations get some teeth: Be prepared
In July, a Seattle healthcare agency received a six-figure fine by the U.S. Department of Health and Human Services for compromising patient data. The penalty was the first of its kind, raising the stakes on HIPAA compliance. As HIPAA regulations sta... Tip
-
Defining adequate security controls
Because of the changing nature of technology, the language in the Sarbanes-Oxley Act is purposefully vague. This article explores the meaning of adequate security controls and what is required for SOX compliance. Tip
-
Compliance guide for managers: Lessons learned and best decisions
Compliance guide for managers: Lessons learned and best decisions Tip
-
Become compliant -- without breaking the bank
Re-use your existing tools to meet regulatory demands. Tip
-
Lake Forest Hospital's Rx for HIPAA compliance
In this case study, learn how merging networks helped one medical facility with HIPAA compliance requirements. Tip
-
What to do when you've been hacked
Network hacking attacks are more common that most of us would like to admit. In the second installment of his series on managing secure networks, Michael Gregg looks at six questions you need to ask of your organization if you've been hacked, and sug... Tip
-
Secure data transmission methods
The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements. Tip
-
Separating fact from fiction: Security technologies for regulatory compliance
This presentation by Burton Group analyst Diana Kelley explores what companies need to think about when creating policies for compliance. Tip
Security Management Strategies for the CIO