Healthcare Cyber Security Services

Our experts help healthcare providers identify risks to protected health information (PHI) and reduce the risk of fines and legal action

GET A FREE CONSULTATION

HIPAA risk assessment

We have a 100% acceptance rate with OCR

 

HIPAA states a Covered Entity or Business Associate, handling electronic protected health information (ePHI), requires risk assessments to be performed annually. Get a plan in action to resolve gaps, and pass Office for Civil Rights (OCR) audits to avoid a fine.

 

If your organization is audited by OCR, a risk assessment will also provide you with a legally defensible position.

 

Read more: How To Perform A Successful HIPAA Risk Assessment

Cyber Security Healthcare Statistics
Security Rule GAP Assessment

Security rule gap assessment

 

Conducting a HIPAA gap analysis allows an organization to assess its current posture and implementation status of all HIPAA Security, Privacy, and Breach rule standards and implementation specifications.

 

Gap analysis is often the first step organizations take when assessing their compliance. This type of review is generally a higher-level process, with limited assurance testing, and is aimed at identifying major safeguard gaps.

How it works with PurpleSec

consultation call

We begin every engagement with a friendly chat to better understand your company’s cyber security goals.

project manager

A security engineer and project manager will create a plan of action and milestones for the project.

penetration testing report

Observations and recommendations collected and formatted into an executive report – including steps towards remediation.

How we help you meet HIPAA requirements

HIPAA Penetration Testing

 

NIST has issued a special recommendation for HIPAA that says, “Conduct trusted penetration testing of the effectiveness of security controls in place, if reasonable and appropriate. This validates your exposure to actual vulnerabilities.”

 

It also says to document any deficiencies that are identified in a technically detailed report and include effective, efficient, and clear methods for remediation. That is a NIST recommendation specifically for HIPAA.

 

All information that is created and/or stored on the tested systems will be removed from these systems. If this is for some reason not possible from a remote system, all these files (with their location) will be detailed in the technical report so that your technical staff will be able to remove these after the report has been received.

Incident Response Planning

 

Incident Response Plans are not a one-size-fits-all document. Each organization must adapt to encompass its unique requirements. That being said, certain best practices can help ensure that any entity’s IRP satisfies legal requirements, serves patients and customers, and protects its reputation.

Customer success

Cyber Security Services Firm Review - PurpleSec

Challenges Addressed

 

  • Required a one-time network vulnerability scan and assessment
  • Required a one-time network penetration test.
  • Current reporting were not seen as useful or valuable in the remediation process

 

Technologies Leveraged

  • Nessus

How We Delivered

 

  • Provided a network vulnerability assessment and penetration test report in 30 days
  • Worked with client to determine information requirements for their remediation process
  • Delivered a custom report to meet client needs
  • Provided explanations as to what value the current set of reports have in a remediation process
  • Over 100 IP addresses scanned internally and externally