Category

Articles

Tabletop Exercises: Unappreciated and Underutilized

By | Articles

Value for healthcare security – Not just a government planning tool

Government defense and response agencies from the Pentagon to FEMA, from state government to the EPA, have been conducting tabletop exercises (TTXs) for years. Why? In a word: they work. Cybersecurity attacks have been increasing in numbers and complexity against our government’s critical infrastructures and led to the development of cybersecurity exercises as a strategic way for an organization to test their detection and response actions, and as well as their response to information security threats and vulnerabilities in a real-time environment. Read More

What is HITRUST and how can it Benefit your Organization?

By | Articles

Today, covered entities and business associates are addressing a wide-range of regulatory requirements necessary to solve the growing complexities in the healthcare industry. Evolving technologies, migration to the Cloud, and cyber threats like ransomware are just a few top-of-the-mind issues. Combine those with regulations under HIPAA, Meaningful Use, PCI, COBIT and ISO, and you will find that covered entities and business associates need a way to manage their security programs more effectively. Read More

Take a fresh look at your annual Security Risk Assessment (SRA)

By | Articles

Organizational Resilience and Security Risk Assessments

The importance of a Security Risk Assessment is clear — it helps healthcare organizations ensure their physical, technical, and administrative safeguards are compliant with HIPAA requirements. It also assists in showing areas where an organization might be putting PHI and other sensitive information at risk.
Read More

Four Tips to Help Protect your Medical Devices

By | Articles

The Challenge of Medical Devices: 

Medical devices represent significant exposure and potential vulnerability to healthcare organizations.
There are thousands of medical devices in use even in small medical operations. These devices are generally made to meet a specific use, and not often created with security at top of mind. They are also essential to keep functioning in order for health systems to operate. The volume, use, and design of medical devices combine therefore to present a unique challenge for healthcare security. Read More

BluePrint Security Services was rated 97.2* in KLAS Cybersecurity Services 2018 report

By | Articles

BluePrint Security Services was rated in the advisory focused firm category, scoring 97.2* out of a possible 100 points. The Intraprise Health business was praised by hospital and health system clients for five key areas – mitigating security risks, healthcare knowledge, a unique audit methodology, strategic expertise, and tailoring services to client need (Customer Interview Details, Page 69 – Cybersecurity Services 2018.). Read More

Patient Engagement Platform at Inspira Health Network

By | Articles

Health network uses Dynamics 365 to transform care delivery and wow patients

July 13, 2018

In a market where every provider delivers quality, Inspira Health Network wanted to go one step further by offering wow-factor patient service. So, the New Jersey–based healthcare provider adopted Microsoft Dynamics 365 to deepen its understanding of the histories, habits, needs, and preferences of every healthcare consumer in its community. Now, Inspira can turn patients into lifetime customers, stand out from the competition, get care to where it’s needed, drive down healthcare costs, and promote better patient outcomes.

Read More