Alli Schuh, Author at Security Boulevard

Safeguards to protect patient data

| | All Blog Posts
Protecting patient data is a herculean task for healthcare organizations, as protections must be in place for internal and external threats. On top of that, HIPAA regulations add in a layer of required parameters that healthcare organizations must have in place to be compliant and not face penalties.  HIPAA has ... Read More

What is Zero Trust Architecture?

| | All Blog Posts
Zero trust network access? Zero trust architecture? Zero trust model? Zero trust concept? Zero trust security? If you’re in the cybersecurity field, chances are you’ve come across these terms (or any variants of it) enough to know what Zero Trust means – or you’re at least curious enough to Google ... Read More

The First Step to Protect Against IT Hacking

| | All Blog Posts
IT hacking is an ever-growing issue in the healthcare industry, with 2020 being one of the biggest years for cybersecurity attacks to date. COVID-19 played a large role in the uptick in attacks as many threats targeted remote workers and the fears surrounding the ongoing pandemic. The largest known breach ... Read More

2021 Best in KLAS – Maize Analytics Ranked the Top Patient Privacy Monitoring Solution

| | All Blog Posts
Maize Analytics, a leading provider of data governance solutions, announces today that it has been ranked the top Patient Privacy Monitoring Solution in the 2021 Best in KLAS: Software & Services Report. Maize Analytics was founded in 2013 with the goal of helping healthcare organizations protect patient data. Through Maize’s ... Read More

Why Telehealth Needs to Tighten Cybersecurity Measures

| | All Blog Posts
Some experts warn that the ongoing pandemic is not an unprecedented event. Historically, there have been numerous infectious diseases that have swept the globe. And though it may not be within the next few decades or century, another global pandemic is possible after COVID-19 has been quelled. The pandemic has ... Read More

4 Tips for Building a Successful Access Monitoring Process

| | All Blog Posts
Monitoring is the 5th element of the 7 elements of an effective compliance program. It is a continuous task that compliance and privacy teams must do to ensure any inappropriate accesses are detected and resolved in a timely manner. When discussing how your team should go about monitoring, it is ... Read More