What does HIPAA say about texting your patients? That depends on several factors, including what type of phone you use, and what data you’re transmitting.Read More
Health Information Technology
Eagle specializes in services related to Health Information Technology, including services to help physician practices select and implement electronic health record and other technologies, performing a wide variety of HIPAA security related services including creation of HIPAA Security Policies, conducting HIPAA audits, performing the HIPAA Security Risk Analysis, conducting technical vulnerability analyses and a variety of other services.
The Provider Third Party Risk Management Council, made of a consortium of leading hospitals, introduced a new approach to third-party risk management. How can you better serve them? The solution is simple – any vendor of a certain size who wishes to do business with one the member hospitals must successfully complete – and annually maintain — a certification using the HITRUST CSF. Member hospitals will accept a HITRUST certification as evidence of a robust security program. No questionnaires or further dialog is necessary.Read More
A key component of any risk analysis and risk management program is understanding who the threats to your organization’s PHI data are.Read More
Cyber-attacks on healthcare providers increased from 2016 to 2017, and are still trending upwards. Extensive private data plus inadequate security makes healthcare organizations attractive targets for attackers and, all too often, victims of their own errors.Read More