
Ensuring a solid medical device cybersecurity program
The need for appropriate medical device cybersecurity is critical. Healthcare organizations must protect their patients, and any sensitive data, by implementing and enforcing a solid medical device cybersecurity program.
What is Vendor Risk Management? The Fundamental Guide
This fundamental guide walks you through definitions, strategies, roadblocks and solutions to build a strategy that works for your organization.

5 Reasons To Take Your Healthcare Compliance Audits Mobile
If you’re still doing HIPAA audits the old-fashioned way with pen and paper, you’re missing out on valuable time savings, and you could be making critical errors in the back-end reporting of healthcare compliance audit information.
A Guide To The NIST Cybersecurity Framework
Cyberattacks. It’s rare to turn on the news without hearing about a major organization that has become the victim of an online assault. Unfortunately, much more cybercrime is taking place under the media’s radar, and large corporations and national governments aren’t the only targets. Local governments, small business and healthcare organizations are prime targets for attackers.
Data Breach Litigation: What You Need to Know
As sensitive data breaches become increasingly commonplace, many individuals are seeking to hold breached organizations responsible for the violation of their privacy. As a result, class- action lawsuits have emerged as a popular trend in the world of data breach litigation. With the rapid increase in this type of legal action, healthcare organizations must take measures to prevent data breaches. The first step to prevention is understanding why class-action lawsuits are on the rise as a response to data breaches.
ComplyAssistant Launches New Mobile Application for Healthcare Compliance
ComplyAssistant announced today the launch of its new mobile application to support risk management and healthcare compliance. The mobile application works in conjunction with ComplyAssistant’s leading governance, risk and compliance (GRC) software, enabling audit teams to become more efficient with managing, reporting and mitigating audit exceptions.
Building Your Medical Device Cybersecurity Protocol
Medical device cybersecurity has become significantly more important in the age of digital health. There are essential actions health systems must take to protect themselves – and their patients. This blog offers 5 guidelines to evaluate and maintain your medical device cybersecurity.

From 300 to 36: Reducing Hurdles in Business Associate Assessments
Business associate assessments are notoriously burdensome and time consuming for both covered entity and the business associate (BA). But the typical 300-question survey can be significantly narrowed by focusing on the most critical and problematic issues.
ComplyAssistant and NJAMHAA Partner to Help Members Keep Data Secure
Colts Neck, NJ – March 2, 2018 As compliance with data-security laws and regulations can be a costly endeavor, especially
Visit ComplyAssistant in Las Vegas: April 15 – 18
ComplyAssistant executives Gerry Blass (President and CEO) and Ken J. Reiher (VP Operations) will be stationed at booth number 607 during the 22nd Annual Health Care Compliance Association (HCCA) National Conference.

GDPR Impact on US Healthcare Organizations
The General Data Protection Regulation (GDPR) is the European Union (EU) regulation on privacy and security of personally identifiable information (PII). It goes into effect on May 25, 2018. This blog provides an important comparison between GDPR and HIPAA.
Sensato Cybersecurity Solutions and ComplyAssistant Introduce Medical Device Cybersecurity Operations Program
MD-COP is a comprehensive offering specifically designed to protect medical devices deployed in healthcare provider settings. The MD-COP solutions provide hospitals with a dedicated security operations center, medical device breach detection system, medical device cybersecurity risk assessment, medical device cybersecurity policy, medical device manufacturer risk assessment and scoring, on-going threat intelligence and medical device cybersecurity best practices.