Category: Security

HITRUST’s Contribution to Healthcare’s New ‘Network of Networks’
Security
shares2321 views
Security
shares2321 views

HITRUST’s Contribution to Healthcare’s New ‘Network of Networks’

Lacy Deatrich - May 17, 2019

HITRUST’s Role in the New Trusted Exchange Framework and Connected Agreement (TEFCA) By Anne Kimbol, Chief Privacy Officer, HITRUST The federal government took a significant step last…

The Paubox™ HITRUST Journey
Security
shares415 views
Security
shares415 views

The Paubox™ HITRUST Journey

Lacy Deatrich - Mar 07, 2019

Written by Hoala Greevy, CEO, Paubox Our HITRUST journey began eleven months ago when a Fortune 50 company reached out to us. They were looking for a…

New National Risk Management Center to Help Combat Cybersecurity
Security
shares7371 views
Security
shares7371 views

New National Risk Management Center to Help Combat Cybersecurity

Lacy Deatrich - Aug 24, 2018

Details forthcoming in new Department of Homeland Security initiative Written by Carl Anderson, Chief Legal Officer & Senior Vice President of Governmental Affairs, HITRUST Make no mistake,…

Cloud Security Myths Busted During Microsoft’s HIMSS Healthcare Security Forum
Security
shares12918 views
Security
shares12918 views

Cloud Security Myths Busted During Microsoft’s HIMSS Healthcare Security Forum

Lacy Deatrich - Nov 20, 2017

Written by HITRUST Independent Security Journalist Sean Martin. For many years, covered entities (CEs) and other healthcare providers, throughout North America and beyond, have had challenges thinking…

The Five Questions to Ask About Your Security Program
Security
shares2191 views
Security
shares2191 views

The Five Questions to Ask About Your Security Program

Lacy Deatrich - Jul 05, 2017

Written by Michael Frederick, VP of Operations, HITRUST As board members or senior executives, you are responsible for making governing decisions for all aspects of a business.…

Information Security Awareness Beyond Technical Safeguards
Security
shares2039 views
Security
shares2039 views

Information Security Awareness Beyond Technical Safeguards

HITRUST Admin - Dec 07, 2016

By Wes Rhea, CCO and PSO, BioIQ. The majority of healthcare organizations have the ability to protect their sensitive information via technology. Firewalls, intrusion prevention systems, encryption and anti-virus software…

The Art and Science of Cost-Effective HITRUST Certification
Security
shares1619 views
Security
shares1619 views

The Art and Science of Cost-Effective HITRUST Certification

HITRUST Admin - Aug 08, 2016

By Brian Selfridge, Partner, Meditology Services  Aligning and certifying with the HITRUST CSF is one of the most efficient means of demonstrating compliance and building an effective…

Capitalizing on Analytics Means Protecting, Securing, and Sharing Your Data
Security
shares1071 views
Security
shares1071 views

Capitalizing on Analytics Means Protecting, Securing, and Sharing Your Data

HITRUST Admin - Aug 08, 2016

By Adam Lorant, VP, Product and Solutions, PHEMI Modern data science and analytics hold the potential to transform healthcare—from helping hospitals operate more efficiently, to identifying precision…

Comprehensive Security Assessment or Baseline Security Assessment?
Security
shares1892 views
Security
shares1892 views

Comprehensive Security Assessment or Baseline Security Assessment?

HITRUST Admin - Jun 07, 2016

By Ken Vander Wal, Chief Compliance Officer, HITRUST. One of the frequent questions we get from organizations is, “Do we need a comprehensive security assessment or can we…