Using a third party to perform a risk assessment is an optimal business practice, because an independent security consultant has a fresh set of eyes to better evaluate the risks and vulnerabilities to the confidentiality, integrity or availability of electronic protected health information.
— Bob Havens, Technical Specialist Hancock Regional Hospital, Greenfield, Ind.
Security breaches can leave providers and practice administrators personally liable, facing monetary fines and jail time if they knowingly fail to protect the privacy of electronic patient health information. PHA’s IT specialists consult, educate/train, and guide IT departments with in-house projects and conduct in-depth assessments in preparation for both HIPAA and Meaningful Use audits. We work onsite, interviewing key staff, conducting physical walkthroughs of facilities, and performing the reviews, scans, and assessments necessary to create a realistic security and privacy remediation plan.
Health IT — Security Training for the IT and Non-IT Professional
Mobile Technology: Do's and Don'ts for Today's Health Professional
HIPAA Omnibus: What it means for you
Experienced IT Team
PHA’s core team of security professionals comes with a wide range of educational and technology backgrounds as well as industry certifications from (ISC)2, SANS Information Security & Research, and the Information Systems Audit and Control Association (ISACA).
Read the HIMSS ProBook to find out what’s ahead for information technology and management systems in 2013.