Discover the Full Potential of Your HITRUST Program

Discover the Full Potential of Your HITRUST Program

It’s an unfortunate sign of the times that data breaches and privacy concerns are increasingly posing significant risks. In fact, 83% of the organizations IBM Security studied in their annual Cost of a Data Breach report have had more than one data breach. While it’s crucial to the survival of your business that you establish … Read more

How Do HITRUST, HIPAA, and NIST Work Together?

How Do HITRUST, HIPAA, and NIST Work Together?

If your company deals with credit card numbers, patient records, customer information or other sensitive data, the list of compliance standards, federal regulations, and state laws can be very long. And if you’re a healthcare organization? It’s even more complex. What is HIPAA? Probably the most well-known compliance standard is the Health Insurance Portability and … Read more

Here’s What You Need to Know about HITRUST’s New Assessment and Updates

Here’s What You Need to Know about HITRUST’s New Assessment and Updates

In an effort to stay relevant with current and emerging threats, HITRUST has made several updates. First, the big news: HITRUST has expanded its assessment portfolio to include a less-complex assessment with fewer requirements, called the Essentials, 1-year (e1) Validated Assessment. HITRUST has also updated the release of CSF v11, made new Correction Active Plan … Read more

The Difference between HITRUST i1 and r2

The Difference between HITRUST i1 and r2

HITRUST is the most widely adopted security and privacy framework in the healthcare industry, and it’s required by more than 84% of hospitals and health plans, according to Healthcare Weekly. We talked with 360 Advanced’s Practice Director Ryan Winkler, our HITRUST authority, about the HITRUST Risk-based, 2-year (r2) Validated Assessment + Certification, and the newly … Read more

How Compliance Audits Can Help You Meet Your Long-Term Business Goals

How Compliance Audits Can Help You Meet Your Long-Term Business Goals

Some organizations consider compliance audits a cost of doing business: resource-intensive and time-consuming, but a necessary step toward securing a new contract or maintaining an existing agreement. However, this view doesn’t take into account the full impact of a robust cybersecurity program – especially in today’s competitive landscape. Strategic Compliance Consumers have higher expectations for … Read more

What Kind of Compliance Documentation Is Required for a Security Audit?

360 Advanced - What Kind of Documentation Is Required for a Security Audit

Compliance audits require a significant amount of documentation. Whether you’re working toward a SOC report, a HITRUST certification, a PCI Report on Compliance, or any other security initiative, you will need to provide your auditor with formal evidence that your policies and processes are designed in accordance with relevant requirements. The documents you will need … Read more

Healthcare Security Compliance Assessments: Choosing the Right Cybersecurity Audit

Healthcare Security Compliance Assessments

Healthcare organizations spend, on average, between four and seven percent of their IT budgets on cybersecurity. However, as security teams strive to spend their resources on products and services that protect patient data while delivering a meaningful return on their investment, they face a critical question: which cybersecurity and compliance assessments are the best use … Read more

HIPAA Risk Assessments: What Kind of Privacy and Security Threat Analysis is Required for Compliance?

HIPAA Risk Assessments

Under HIPAA, covered entities are required to complete a risk assessment (also referred to as a risk analysis) to identify potential threats to their protected health information (PHI). “Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications in the Security … Read more

Responding to a Healthcare Data Breach

Responding to a Healthcare Data Breach

With a record number of healthcare data breaches occurring in 2019 – 510 incidents of 500 or more records each, according to the HIPAA Journal – organizations are becoming more attentive to their security controls. Preventive measures, such as penetration testing and strong cybersecurity controls, can reduce the risk of a breach. However, the constant … Read more