CybersecurityHIPAA Security HIPAA Security Risk Assessment for Healthcare A Security Risk Assessment (SRA) is a mandatory annual requirement under the HIPAA Security Rule…Jordan KeatingOctober 5, 2025
CybersecurityPenetration Testing Cyber Engineering Services for Healthcare Hospitals and health systems often receive Penetration Test or Security Risk Assessment reports identifying critical…Jordan KeatingSeptember 24, 2025
CybersecurityHIPAAHIPAA Security Exciting News: We’re Expanding to Deliver Even Stronger Cybersecurity Solutions Exciting News: We’re Expanding to Deliver Even Stronger Cybersecurity Solutions We’re excited to share some…Jordan KeatingJune 10, 2025
CybersecurityHIPAAHIPAA Security Healthcare Prepares for Enhanced HIPAA Audits Get ready for the next phase of HIPAA audits with insights from McKnights and BlueOrange…Joan ElewskiJanuary 6, 2025
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityPhishingRansomware Phishing Awareness Boosts Hospital Cyber Security With phishing attempts emerging as a key part of most cyber attacks, the IT leadership…Joan ElewskiAugust 13, 2024
CybersecurityEthical HackingHIPAAHIPAA Privacy ComplianceHIPAA SecurityPenetration Testing Penetration Testing for Healthcare Cyber Security Penetration testing is part of a comprehensive cyber security strategy. Learn how RiverSpring Living partnered…Joan ElewskiJuly 14, 2024
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA Security Healthcare Cyber Security for RiverSpring Living Healthcare cyber security has become a top priority as the industry faces a rising threat…Joan ElewskiJune 17, 2024
CybersecurityHIPAAHIPAA Security Focusing on the Importance of Access Control The OCR defines Access Control, “The Access Control standard is a technical safeguard that requires…Jordan KeatingFebruary 12, 2024
HIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy Hospital Shares Too Much Info with the Press – Reaches Settlement with OCR A large hospital network in New Hampshire reached a settlement with HHS’ Office of Civil…Jordan KeatingJanuary 30, 2024
CybersecurityHIPAAHIPAA Security Take Advantage of CISA’s Vulnerability Catalog Quick reminder that CISA maintains a catalog of known exploited vulnerabilities that is available to…Jordan KeatingJanuary 5, 2024