Keeping Information Safe
Our risk assessments are readable, comprehendible and actionable; and we provide the latest solutions for secure wireless migration, disaster recovery planning, and vulnerability protection.
Working with Purdue Healthcare Advisors helped to validate what Rush Memorial Hospital has done for years as a leader in rural healthcare informatics...mitigate network security risk.
— Jim Boyer, CIO/VP Technology, Rush Memorial Hospital
We annually review our policies and practices as they relate to compliance with the HIPAA Security Rule to maintain a robust and solid security foundation. Using a third party to perform a risk assessment is an optimal business practice, because an independent security consultant has a fresh set of eyes to better evaluate the risks and vulnerabilities to the confidentiality, integrity or availability of electronic protected health information.
— Bob Havens, Technical Specialist, Hancock Regional Hospital
cyberTAP Flyer (pdf)
Purdue, FSSA partner to bring new care models, process improvements, and technology systems to four Indiana communities to improve opioids addiction treatment and hospital transitions from long-term care
PHA helps , Ind.-based pediatrics practice successfully achieve MU and defend its attestation
Health IT Security & Privacy for Healthcare
To guide practices and hospitals in information technology best practices, PHA turns to cyberTAP formed in 2019 by Purdue University to meet the growing demand for cybersecurity services and education. Since PHA began offering security services in 2012, our affordable rates, impeccable reputation, and attention to detail have set us apart from for-profit vendors. Last year alone, we were onsite at 600+ healthcare facilities, providing assessments, testing, audits, project management, training and consulting. Now our clients have access to cyberTAP's state-of-the-art Cyber Range, which provides an immersive, simulated environment for industry partner workforce development.
In addition to the assessments and simulations listed below, cyberTAP can advise on encryption strategies; secure wireless migration; and disaster recovery planning.
To inquire about scheduling cyberTAP to perform your annual Health IT Security Risk Assessment or other healthcare-related IT services, please scroll down and fill out the online form. To inquire about other cyberTAP services, please contact a member of the cyberTAP team.
Security Risk Assessments (SRA) — We work onsite, interviewing key staff, conducting physical facility walk-throughs, and performing the reviews, scans, and assessments necessary to create a realistic security and privacy remediation plan. Assessment includes review of documentation, administrative controls, network architecture and configuration; a vulnerability analysis; and audit testing.
External Vulnerability Assessments (EVA) — cyberTAP can manage the risk environment within your Internetfacing infrastructure and attached network systems or provide one-time testing.
Technology Assessments — Onsite assessment of hardware, software and network; network speed; and laptops/desktops. Comes with post-assessment recommendations on upgrades for cost savings.
Phishing Simulation & Security Awareness Education — The five most common attack types that social engineers use to target their victims are phishing, pretexting, baiting, quid pro quo and tailgating. Using a proactive approach, cyberTAP helps clients see which employees are susceptible to being victimized by a phishing attack in a safe and controlled simulation exercise. Learners gain awareness of warning signs and common tricks used by attackers.
Penetration Testing — Actively tests your security defenses and network configurations to find holes before the bad guys do.
Password Audits — Provides evidence that employees are adhering to password-creation best practices.