HIPAA and HITRUST


HIPAA and HITRUST

HIPAA Compliance and HITRUST Certification

Sword & Shield provides HIPAA compliance and HITRUST certification news from our healthcare security experts.

Learn if HIPAA compliance applies to you, what you need to know about HIPAA risk assessments, why you need configuration standards for HIPAA compliance, why data encryption is important, and more.

Our HITRUST certified assessors give advice and provide an introduction to HITRUST, delve into if you should get HITRUST certified even if you’re not required to do so, and more.


16

Jan 2019

Should I Go Through HITRUST Certification Even If It’s Not Required?

The HITRUST CSF is a set of security controls designed to help organizations that work with sensitive healthcare data to become more secure. Since HITRUST is gaining traction, many organization decision makers are asking the question, “Should my company go through HITRUST certification even though we’re not required to do so?”. This article explores what it means to be HITRUST certified and the benefits of...

Read More


02

Jan 2019

What You Need to Know About HIPAA Risk Assessments

The Health Insurance Portability and Accountability Act (HIPAA) describes how organizations that store, process, maintain, or transmit Personal Health Information (PHI) must handle this sensitive information. HIPAA is comprised of the Privacy Rule, the Security Rule, and the Breach Notification Rule which collectively mandate how patient privacy should be ensured and how the sensitive health data should be protected. One component of HIPAA is the...

Read More


17

Dec 2018

Sword & Shield Announces HIPAA Compliance Case Study

Award winning national information security and compliance firm helps company gain confidence in bidding for new contracts KNOXVILLE, Tenn. December 17, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity and compliance firm headquartered in Knoxville, Tennessee, announced today the release of a new HIPAA compliance case study. The case study documents how CTS Software, the developer of TripMaster, enlisted Sword & Shield’s...

Read More


05

Nov 2018

The Importance of Configuration Standards for Regulatory Compliance

Developing and implementing strong configuration standards for regulatory compliance is an important aspect of an organization’s cybersecurity strategy. Privacy regulations commonly require configuration standards. Therefore, knowing how to create strong ones is an important part of achieving and maintaining regulatory compliance for frameworks such as HIPAA/HITECH, PCI DSS, and NIST. What Are Regulatory Compliance Configuration Standards? All technology comes with a default configuration and, in...

Read More


10

Oct 2018

Does HIPAA Apply to Me?

Over the course of Sword & Shield’s years of HIPAA compliance consulting, we have been asked many times, “Does HIPAA apply to me?” In this post, we describe how your organization can determine whether or not you are required to be compliant with the HIPAA regulations for privacy and security of protected health information (PHI). Introduction to HIPAA The Health Insurance Portability and Accountability Act (HIPAA)...

Read More


31

Jul 2018

Lessons Learned from the MD Anderson Breaches

The MD Anderson Cancer Center at the University of Texas was recently fined $4.3 million by the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) concerning data breaches that resulted in the loss of the health information of 33,500 patients. In this article, we called on one of our healthcare experts, Security Consultant Jeremy Bess, to explain what lessons can...

Read More


19

Jun 2018

HITRUST Introduction: Getting Started

Sword & Shield offers this HITRUST introduction to take some of the mystery out of this comprehensive compliance tool and to explain what you need to know in order to get started with HITRUST compliance. Let’s start with the basics: What is HITRUST? The Health Information Trust Alliance (HITRUST) is a United States company that has partnered with leaders in the healthcare, technology, and information security...

Read More


09

May 2018

Complying with HIPAA encryption standards; what you need to know

By Jeremy Watson Have you encrypted your electronic protected health information (ePHI) data at rest (being stored in persistent storage) and in transit (flowing from one point to another, whether it be the over the internet or a private network)? If so, you’re compliant with the HIPAA encryption standard and, therefore, covered by the Safe Harbor Rule in case of a breach. This means you’re...

Read More


11

Apr 2018

Understanding HIPAA Today

Look back into the Healthcare Privacy and Security Standard’s growth to understand where we are today. By Chris Lyons When the Health Insurance Portability and Accountability Act (HIPAA) was signed into law in August of 1996, the intent was to provide an improved method of allowing employees to ensure they were able to retain healthcare coverage between jobs, combat waste and fraud in healthcare, and...

Read More


28

Sep 2017

First HIPAA Risk Assessment? Here’s what you should know.

By Chris Lyons HIPAA compliance can be a daunting endeavor, especially if your organization has never faced this challenge. A HIPAA risk assessment can help you achieve compliance. If you are considering your first HIPAA risk assessment, there are a few things you should know. Here are four points to get you on your way: Understand your security environment Prepare for the assessor’s visit by gathering...

Read More



Page 1 of 212