ComplyAssistant’s Ken Reiher attended the first annual ViVE Conference and had the following reaction and takeaway noted by Health IT Answers in their “First Annual ViVE Conference: Reactions and Takeaways” article. “Throughout my career, I have attended several healthcare conferences but, ViVE was a little different. Since the majority of attendees have not attended a […]
Read more...
ComplyAssistant’s Gerry Blass comments on ways to mitigate rising cyberattacks in Fierce Healthcare’s “Amid rising cyberattacks, a more discreet trend: EHR snooping” article from March 7, 2022. “Though most systems are not likely to completely block access to medical records, they can include tools like break-the-glass, which offers a warning as a deterrent before allowing […]
Read more...
An article released by Gartner reported that by the year 2025, cyberattackers will have weaponized operational technology (OT) environments to successfully harm or kill humans. OT attacks, also known as attacks on hardware and software that monitors or controls equipment, assets, and processes, are on the rise. Consider the ransomware attack on the Colonial Pipeline, for example. Effects were felt up and down the East Coast, resulting in a payout of $4.4 million and damage to hospitals, emergency medical services, and law enforcement agencies.
Read more...
When looking for a new GRC software platform, it’s important to have one with all the latest features including task management, audits, and more.
Read more...
Healthcare risk doesn’t stop at the facility’s door. Covered entities have countless business associates (BA), each of which poses risks of its own. That, in and of itself, is a challenge, but Gerry Blass, President and CEO of ComplyAssistant observes in this podcast that many covered entities aren’t even sure of their complete list of vendors, let alone the risks that can reside in them.
Read more...
ComplyAssistant client St. Joseph’s Health’s Jesse Fasolo, PhD student, director, technology infrastructure & cybersecurity, information security officer, said Information security is changing so fast, healthcare systems need to work on shorter strategies so they can pivot to what’s current.
Read more...
In today’s ever-changing cyber landscape, we talk a lot about what measures to take if you have experienced a data breach or ransomware attack. Who do I call if my patient’s health information has been comprised? Do I need to pay the ransom? How long will my organization be down and disrupt the continuity of care?
Read more...
In today’s busy world it’s not uncommon for organizations to outsource work to third-party vendors. This can be a great benefit for many reasons: less pressure on the internal team, more time for other pressing tasks, expertise in areas that require more guidance and operational control and efficiency, to name a few.
Read more...