A C3PAOs assessment is a critical step for defense contractors seeking compliance with the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC). CMMC Third-Party Assessor Organizations (C3PAOs) are the…
-
-
In 2019, the Department of Defense (DoD), together with Johns Hopkins University Applied Physics Laboratory (APL) and the Carnegie Mellon University Software Engineering Institute (SEI), began reviewing existing cybersecurity standards.…
-
Over the past decade, the healthcare industry has undergone a major shift from paper records to electronic health records (EHRs). In 2008, fewer than half of healthcare organizations used EHR…
-
As a medical or health care provider, staying compliant with federal regulations is one of the most important—and often most stressful, parts of protecting your patients’ rights. Federal, state, and…
-
System and Communications Protection (SC) Requirements for CMMC Level 3
by RSI Securityby RSI SecurityTo achieve CMMC Level 3 certification, Department of Defense (DoD) contractors must meet strict cybersecurity requirements, especially in the area of System and Communications Protection (SC).
-
Organizations in and around healthcare must comply with HIPAA regulations to safeguard the privacy, confidentiality, and integrity of Protected Health Information (PHI). A critical part of compliance involves HIPAA violation…
-
Healthcare organizations and their business associates must be prepared to restore systems, applications, and sensitive data in the event of a disruption. A HIPAA compliant disaster recovery plan ensures that…
-
How to Ensure the Security of Electronic Health Records for HIPAA Compliance
by RSI Securityby RSI SecuritySafeguarding electronic health records security is a top priority for healthcare organizations and their business associates. Because EHR systems store sensitive protected health information (PHI), organizations must follow strict requirements under…
-
Under the Health Insurance Portability and Accountability Act (HIPAA), patient data security is a critical requirement, and the protected health information (PHI) of patients must be secured at all times.…
-
Any organization that handles Protected Health Information (PHI) is required to comply with HIPAA to protect the privacy, security, and integrity of patient data. Enforcement of these regulations falls under…