BLOG

HIPAA Compliance Audits

Our team at Meditology performs these assessments for both covered entities and business associates, no matter their size. Meditology uses the OCR’s audit protocol and can provide your organization with information about which HIPAA standards are partially- or non-compliant along with recommendations to bring those items into compliance. Our vast experience in healthcare allows us to tailor the recommendations to suit your organization’s needs and available resources.  Read More

Navigating the Cyber Storm: A Healthcare Cyber Leader's Guide to Communication and Expectation Management

Today’s cyber leader must exhibit a blend of technological acumen, strategic vision, and communicative prowess to lead effectively amidst what can only be described as a 'cyber storm'. This article will explore the expectations that confront cyber leaders within the healthcare domain, offering insights and strategies to thrive in this fast-evolving landscape. Read More

SOC 2 + CIS Controls

Many of our clients inquire about incorporating other standards into their SOC 2 exam. A common standard that is industry agnostic is the Center for Internet Security’s Critical Security Controls (CIS Controls). The CIS Controls are a set of best practices you can use to ensure you have a strong cybersecurity process in place.  Read More

A Cybersecurity Professional's Guide to HIPAA-Compliant Online Tracking

In the rapidly evolving digital landscape, the intersection of healthcare data privacy and online tracking technologies has become a focal point for both regulatory bodies and privacy advocates. The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently published updated guidance on “Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates,” illuminating the complexities and responsibilities that HIPAA-covered entities and their business associates face in this regard.  Read More

SOC 2 + HIPAA Examination

One of the frequent topics of discussion with my SOC 2 clients is the possibility of integrating the Health Insurance Portability and Accountability Act, as amended, (HIPAA) standards with their existing SOC 2 control set. As either a covered entity or business associate, they are required to comply with the HIPAA regulations. Read More

Rise of Responsible AI

At the advent of what seems to be the most significant technical leap since the introduction of the internet, organizations and individuals alike are struggling to reconcile the remarkable benefits of Artificial Intelligence (AI) with its capacity to make equally negative impacts. To guide general adoption and proper use, healthcare organizations and the industry at large have begun to leverage a prevailing discipline: Responsible AI. Read More

Navigating the Future: Unveiling the HITRUST AI Assurance Program

Artificial Intelligence (AI) systems, including natural language processing, machine learning applications, and continued emerging applications of AI, hold immense promise for the healthcare industry. However, the rapid evolution of these technologies introduces new risks, terminologies, and complexities. Trust in AI systems is paramount, ensuring they operate with the expected quality and integrity while meeting governance, ethical, and legal standards. In response to the evolving AI landscape, HITRUST introduces its AI Assurance Program, the first and only program with the ability to demonstrate compliance with AI assurance controls. Read More

Cyber Resilience in Healthcare: A Strategic Mandate Post Change Healthcare Cyberattack

Meditology has long been at the forefront of healthcare cybersecurity, aiding organizations in navigating the labyrinth of digital threats and compliance complexities. With our industry expertise, we bring a unique and authoritative perspective on the pivotal changes needed in the healthcare sector's approach to cybersecurity post the Change Healthcare incident. We believe the established norms of information security must evolve into a narrative of proactive incident response and cyber resilience. Read More