Keeping Information Safe
Our risk assessments are readable, comprehendible and actionable; and we provide the latest solutions for secure wireless migration, disaster recovery planning, and vulnerability protection.
To consult, assess, educate, train, and guide practices and hospitals in health IT security best practices, PHA turns to CyberTAP, a Purdue University technical assistance outreach program formed in 2019 to meet the growing demand for cybersecurity services and education. CyberTAP offers extensive expertise in health IT security because many of its staff are former PHA security consultants well versed in the security needs of hospital systems, clinics, and small practices.
PHA has offered security services since 2012. Affordable rates, an impeccable reputation, and an attention to detail set us apart from for-profit competitors. Last year alone, Purdue experts were onsite at more than 600 healthcare facilities, providing assessments, testing, audits, project management, training, and consulting. In addition to the services we have traditionally offered the healthcare industry (scroll down), CyberTAP introduces Cyber Range Training and other workforce-development options that may be of interest to your healthcare organization's security professionals. The state-of-the-art cyber range provides an immersive, simulated environment for industry partners to develop the next generation of cyber warriors.
To inquire about scheduling CyberTAP to perform your annual Health IT Security Risk Assessment, please submit this online form. To inquire about other CyberTAP services, please contact a member of the CyberTAP team.
Working with Purdue Healthcare Advisors helped to validate what Rush Memorial Hospital has done for years as a leader in rural healthcare informatics...mitigate network security risk.
— Jim Boyer, CIO/VP Technology, Rush Memorial Hospital
We annually review our policies and practices as they relate to compliance with the HIPAA Security Rule to maintain a robust and solid security foundation. Using a third party to perform a risk assessment is an optimal business practice, because an independent security consultant has a fresh set of eyes to better evaluate the risks and vulnerabilities to the confidentiality, integrity or availability of electronic protected health information.
— Bob Havens, Technical Specialist, Hancock Regional Hospital
Drug abuse fighters get training
Federal award provides funds for Purdue to help Fayette County improve local opioid abuse prevention and treatment
Bailey: A Recap of National Cybersecurity Awareness Month
Purdue, FSSA partner to bring new care models, process improvements, and technology systems to four Indiana communities to improve opioids addiction treatment and hospital transitions from long-term care
Medical Devices: New Challenges in Medical Information Security