The Risk Assessment which is required by the HIPAA Security Rule is often overlooked, misunderstood, or it seems to be too complex to even find a starting point. What some organizations find out is that while they brought in a third party auditor to do a "IT network assessment' that they actually did not end up performing a full blow risk assessment.
The webinar will a primer for the HIPAA Security Rule going over the basics of what is necessary to achieve compliance. The first section will discuss what the Security Rule is and where it came from, who must comply, and what information has to be protected. Having this information should set the stage to validate how critical ePHI is and who is responsible for maintaining its security.
With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization.
The Risk Assessment which is required by the HIPAA Security Rule is often overlooked, misunderstood, or it seems to be too complex to even find a starting point. What some organizations find out is that while they brought in a third party auditor to do a "IT network assessment' that they actually did not end up performing a full blow risk assessment.