Intraprise Health’s Security Risk Assessment looks at an organization’s information security and risk management program in a collaborative, standards-based, and compliance-aware approach. Our Security Risk Assessment service includes strategic, operational, and tactical assessments in order to achieve comprehensive risk mitigation.

Progressive healthcare organizations perform a Security Risk Assessment/HIPAA Risk Analysis on an annual basis in order to maintain HIPAA compliance and fulfill their obligations to PHI security and privacy. Our cyber security professionals have deep HIPAA expertise and are armed with the latest scanning tools and techniques. Using questionnaires, document reviews, client interviews, physical walk-throughs of facilities and internal and external vulnerability testing, Intraprise Health’s security risk assessments analyze large amounts of information. This gives us the most meaningful and accurate vulnerability intelligence for risk analysis and remediation planning.

Take a fresh look at your Annual Security Risk Assessment (SRA)

Download our SRA Checklist
During the course of a Security Risk Assessment, we will:

  • Map vulnerabilities identified to both HIPAA (as amended by HITECH and the Omnibus 2013 Final Rule), NIST Cybersecurity Framework and the HITRUST CSF
  • Ensure HIPAA Compliance
  • Draft a comprehensive Report of Findings incorporating practical, real-world remediation recommendations
  • Present findings and recommendations in stakeholders’ briefing session(s)
  • Provide subject matter expertise for senior management decisions, regarding risk
  • Assist with alignment of strategy, business objectives, and information assurance
Get the structure, detail and clarity that you need to:

  • Evaluate HIPAA/HITECH compliance
  • Document current state of security controls
  • Meet the requirements associated with Meaningful Use
  • Identify gaps that pose true business risk
  • Create a practical remediation roadmap
  • Establish a sustainable operating model for information security and privacy
  • Further relationships based on trust and confidence with clients and business partners.

Additional Resources