Category

Older Posts

Webinar: Securing Your Third-Party Ecosystem

By | Webinars/Events, Older Posts

Third parties (both vendors and business partners) with access to an organization’s Protected Health Information (PHI) and/or Personally Identifiable Information (PII) can put your organization at risk of a data breach. Until recently, Third-Party Risk Management (TPRM) has been primarily treated as a compliance and contract approval “checkpoint,” something to check off the to do list of your procurement process with some level of diligence. But with more frequent and complicated cyberattacks, organizations need to implement effective TPRM programs that truly identify, manage and mitigate security risks.

THIS EVENT HAS PASSED. IF YOU ARE INTERESTED IN A COPY OF THE WEBINAR RECORDING, PLEASE CONTACT PHAYDUK@INTRAPRISEHEALTH.COM.

Join Intraprise Health & Westchester Medical Center on November 14 @ 1pm EST as we discuss how to structure a robust, best-practices driven security program that delivers a high degree of Validation and Assurance.

Read More

Zero Trust Architecture and the Future of Networking

By | Articles, Older Posts, Blog
By Joshua Perri

In today’s networks, having a strong defense at the perimeter-points is not sufficient to keep your data safe. The IT landscape moves very quickly and so do the threats that we face. Strong networks will implement additional defenses to protect the internal boundary points. These additional defenses will ideally vary in strength and type between segments, which house varying sensitivity levels of data. The Healthcare industry has been slowly adopting stricter network segmentation and role-based access throughout the entirety of its networks.
Read More