Press Release: HCRS Is Ready to Assist the 75% of Government Contractors That Are Not Cyber-Compliant
In an effort to protect controlled unclassified information (CUI), the Department of Defense (DoD) has heightened its auditing and enforcement of cyber requirements for government contractors. According to FutureFeed, this comes in the wake of audits where 75 percent of contractors that self-attested as meeting all DoD requirements were shown to be in error. What […]
Press Release: HCRS Achieves CMMC Compliance, Offers Strategies for Companies Looking to Certify
Healthcare Resolution Services is proud to announce that it has met the latest requirements for the Cybersecurity Maturity Model Certification (CMMC) Level 2. As a registered provider organization (RPO), HCRS has a long history of assisting federal, state, and local government organizations achieve their own CMMC compliance. According to Brenda Doles, Principal of HCRS, the […]
What to Do in a Healthcare Data Breach
Cyber threats have been considerably disruptive to the healthcare sector over the last decade. While we’ve outlined steps that organizations can take that will improve their defense, there’s still the question of what to do in the event that a bad actor finds a workaround. Those organizations that are also actively working toward the requirements […]
What You Need to Know About the DoD’s CMMC Assessment
As part of the Cybersecurity Maturity Model Certification’s (CMMC) Version 2.0, the Department of Defense (DoD) is requiring all contractors to perform self-assessments to verify that they meet compliance. These must be submitted annually, both from those that have currently achieved CMMC status, as well as those that intend to apply. Why should your organization […]
Treat Your Healthcare Data Like Controlled Unclassified Information Under CMMC
While government contractors must adhere to the Cybersecurity Maturity Model Certification, the truth is that all healthcare agencies would have better data management by adopting CMMC. It offers the most comprehensive framework for organizing, protecting, and sharing your data, whether it’s what the government would consider classified (requiring security clearance), or controlled unclassified information (CUI) […]
What Is CMMC, and Why Do You Need to Prepare Now for 2.0?
The Cybersecurity Maturity Model Certification (CMMC) has had its timetable updated. If you either currently work with the federal government, or you’re hoping to apply as a contractor, it’s important that you know when CMMC assessments are due, and how much time that gives you to make the necessary improvements. If you don’t work with […]
The Case for Improving Death Certificate Data
Unfortunately, a large portion of the death certificate data in the United States is inaccurate. These range from misidentified causes of death, to errors in medical care that weren’t reported, to coding mistakes that were made when patient data was initially gathered. Not only can these complicate legal matters on behalf of the deceased and […]
What’s Your Cybersecurity Incident Response Plan?
As an agency that operates in the healthcare sector, you’ve probably heard how it’s no longer a matter of “if” but “when” you’ll be exposed to a cyberattack. You’ll be in the best available position to overcome one if you have an established incident response plan, detailing exactly what you intend to do the moment […]
How You Can Meet the New Requirements for CMMC 2.0
Last November, the DoD released its updated requirements for the Cybersecurity Maturity Model Certification, dubbed CMMC 2.0. The reason for this update was two-fold: 1) ensuring that government contractors used the practices necessary for protecting sensitive data; and 2) balancing the financial impact of these requirements so that small businesses could afford to implement them. […]
Why Virtual Private Networks Are a Must-Have in Healthcare Cyber Defense
Virtual private networks (VPNs) should be a key component of your cybersecurity infrastructure. Their purpose is to mask the IP addresses of the mobile devices connected to your network, effectively making the data they send and receive unreadable to anyone outside your organization. What’s more, VPNs maintain this security even when your devices are connected […]