Evaluate alignment with Health and Human Services voluntary cybersecurity practices for the healthcare industry
Complete asset inventory is foundational to cybersecurity
Medical devices are frequent attack vectors in healthcare
Annual risk assessments required by HIPAA and recommended by 405(d)
Strategy should address identify, protect, detect, respond, recover functions
MFA is a critical control highlighted in 405(d) practices
Users should only access data necessary for their job function
Encryption is addressable under HIPAA but strongly recommended by 405(d)
Ransomware recovery depends on secure, tested backups
Plan should cover detection, containment, eradication, recovery, post-incident activities
405(d) recommends regular testing of IR plans
Third-party breaches are a leading cause of healthcare data incidents
Annual security assessments of critical vendors recommended
Please answer all required questions to see your results