Remove category cyber-security
article thumbnail

CISA Releases Decision Tree Methodology for Assessing and Remediating Software Vulnerabilities

HIPAA Journal

CISA Executive Assistant Director (EAD) Eric Goldstein explained in a recent blog post that there are three key steps needed to advance the vulnerability management ecosystem. When these are all used together, the window cyber threat actors have to exploit networks will be significantly reduced.

HIPAA 97
article thumbnail

The Rise of Fourth-Party Risk in Healthcare––And How to Combat It

HIT Consultant

Brian Selfridge, Healthcare Cybersecurity & Risk Leader at CORL Technologies In recent years, a wave of high-profile cyber attacks has shaken the healthcare industry to its core. Because the fact is that any comprehensive understanding of healthcare security needs to factor in fourth-party vendors as well.

article thumbnail

Compliance is Everybody’s Business: Clinical, Revenue Cycle, IT, Sales and Marketing

YouCompli

Sharon Parsley, JD, MBA, CHC, CHRC contributes a monthly post on compliance officer effectiveness for the YouCompli blog. As much as possible, offer specific examples of what is ok, what is not, and the “why” behind each category. Information Technology and Information Security.