How to Prepare for HITRUST Certification: Gaining Organizational Support

By | News, Articles, Home Page Recent

Why HITRUST?

More than 81 % of U.S. hospitals and health systems and 80 % of U.S. health plans use the HITRUST Common Security Framework (CSF). It provides implementation standard that is understood and accepted throughout the healthcare industry. Having HITRUST certification in place shows other healthcare entities that you take your security seriously.

Now what?

You and your cybersecurity colleagues have done your research. You know the HITRUST framework is top-notch and addresses federal and state regulations and several security frameworks. Executives of your organization see the value in HITRUST’s CSF that will help you assess and manage your organization’s information security. You’ve got the green light. Where do you go from here? Education. From executive leadership to front line employees everyone needs to understand and accept the level of effort and commitment it takes to properly adopt the HITRUST CSF. Organizing educational sessions with stakeholders and identifying an organizational champion (someone that is very visible, respected and influential in the organization) to assist in sending the message.

What’s next?: Engaging staff throughout the organization

Read More

Zero Trust Architecture and the Future of Networking

By | Articles, Home Page Recent
By Joshua Perri

In today’s networks, having a strong defense at the perimeter-points is not sufficient to keep your data safe. The IT landscape moves very quickly and so do the threats that we face. Strong networks will implement additional defenses to protect the internal boundary points. These additional defenses will ideally vary in strength and type between segments, which house varying sensitivity levels of data. The Healthcare industry has been slowly adopting stricter network segmentation and role-based access throughout the entirety of its networks.
Read More

Tabletop Exercises: Unappreciated and Underutilized

By | Articles

Value for healthcare security – Not just a government planning tool

Government defense and response agencies from the Pentagon to FEMA, from state government to the EPA, have been conducting tabletop exercises (TTXs) for years. Why? In a word: they work. Cybersecurity attacks have been increasing in numbers and complexity against our government’s critical infrastructures and led to the development of cybersecurity exercises as a strategic way for an organization to test their detection and response actions, and as well as their response to information security threats and vulnerabilities in a real-time environment. Read More

What is HITRUST and how can it Benefit your Organization?

By | Articles

Today, covered entities and business associates are addressing a wide-range of regulatory requirements necessary to solve the growing complexities in the healthcare industry. Evolving technologies, migration to the Cloud, and cyber threats like ransomware are just a few top-of-the-mind issues. Combine those with regulations under HIPAA, Meaningful Use, PCI, COBIT and ISO, and you will find that covered entities and business associates need a way to manage their security programs more effectively. Read More

Take a fresh look at your annual Security Risk Assessment (SRA)

By | Articles

Organizational Resilience and Security Risk Assessments

The importance of a Security Risk Assessment is clear — it helps healthcare organizations ensure their physical, technical, and administrative safeguards are compliant with HIPAA requirements. It also assists in showing areas where an organization might be putting PHI and other sensitive information at risk.
Read More

Four Tips to Help Protect your Medical Devices

By | Articles, Home Page Recent

The Challenge of Medical Devices: 

Medical devices represent significant exposure and potential vulnerability to healthcare organizations.
There are thousands of medical devices in use even in small medical operations. These devices are generally made to meet a specific use, and not often created with security at top of mind. They are also essential to keep functioning in order for health systems to operate. The volume, use, and design of medical devices combine therefore to present a unique challenge for healthcare security. Read More

Intraprise Health (formerly BluePrint HIT) rated 97.2* in KLAS Cybersecurity Services 2018 report

By | Articles

Intraprise Health (formerly BluePrint Security Services) was rated in the advisory focused firm category, scoring 97.2* out of a possible 100 points. The cybersecurity firm was praised by hospital and health system clients for five key areas – mitigating security risks, healthcare knowledge, a unique audit methodology, strategic expertise, and tailoring services to client need (Customer Interview Details, Page 69 – Cybersecurity Services 2018.). Read More

Patient Engagement Platform at Inspira Health Network

By | Articles

Health network uses Dynamics 365 to transform care delivery and wow patients

July 13, 2018

In a market where every provider delivers quality, Inspira Health Network wanted to go one step further by offering wow-factor patient service. So, the New Jersey–based healthcare provider adopted Microsoft Dynamics 365 to deepen its understanding of the histories, habits, needs, and preferences of every healthcare consumer in its community. Now, Inspira can turn patients into lifetime customers, stand out from the competition, get care to where it’s needed, drive down healthcare costs, and promote better patient outcomes.

Read More