Featured White Papers and Data Sheets

Redspin's Breach Report 2013 — Protected Health Information PHI

A total of 804 large breaches of protected health information (PHI) affecting over 29.2 million patient records have been reported to the Secretary of Health and Human Services (HHS) since the August 2009 interim final breach notification rule was issued as a part of the Health Information Technology for Economic and Clinical Health (HITECH) Act. In this report Redspin provides in-depth analysis of the complete history of PHI data breaches reported to the Department of Health and Human Services (HHS), identifies current trends, and highlights the specific areas most in need of improvement...

Download Report

The Facts About HIPAA, HITECH, and the Omnibus Rule

The healthcare industry is rapidly moving towards increasing use of electronic health records (EHR) and other information systems to provide health information to doctors and patients, pay claims, answer eligibility questions, and conduct a host of other administrative and clinically-based functions. More and more health plans are processing electronic claims, and providing online care management as well as other member self-service applications. Along with the rise in the adoption rate of these new technologies comes the risks of potential security breaches of patient medical records and other healthcare information...

Download White Paper

Redspin's Breach Report 2012 — Protected Health Information

A total of 538 large breaches of protected health information (PHI) affecting over 21.4 million patient records have been reported since the August 2009.

Download Document

Top 5 IT Security Priorities for Hospitals

The number of hospitals using health information technology has more than doubled over the past two years. For those organizations, improving their IT security program has become a...

Download Document

Redspin's 2011 PHI Breach Analysis

Breaches of protected health information (PHI) have reached epidemic proportions. While the Federal government regularly reports on the total number of breaches (385) and individuals affected...

Download Report

HIPAA Security Audits in 2012. Are You Ready?

With stricter enforcement coming soon, how should top executives of healthcare organizations best prepare for the inevitable day when the government's HIPAA Audit team knocks on the door?

Download Advisory

Redspin's 2010 Protected Health Information Breach Analysis

A total of 225 breaches of protected health information affecting 6,067,751 individuals have been recorded since the interim final breach notification regulation was issued in August 2009.

Download White Paper

Are Your Healthcare Business Associates Compliant with the HIPAA Security Rule?

Under the HITECH Act Section 13401(a), Business Associates need to comply with the administrative, physical and technical requirements of the HIPAA Security Rule.

Download Checklist

Penetration Testing — What You Need to Know

So you think you need a Penetration Test. Before you embark on testing, it's important to understand exactly how a Penetration Test fits into your information security program.

Download White Paper

Eight Questions to Ask Your Security Auditor

At Redspin, we believe that every organization responsible for maintaining the privacy and security of sensitive data should invest in an independent review of their IT security.

Download White Paper

Ensuring Security, Privacy, and Compliance With Healthcare IT

Ensuring Security, Privacy, and Compliance While Creating Value With Healthcare IT. A step by step approach to meeting security, privacy, and compliance goals through a focus on value creation.

Download White Paper

Mapping Application Security To Business Value

Considerations and recommendations for reducing business risk by ensuring that your web applications are secure. Helpful information for IT, information security professionals, and business unit managers.

Download White Paper

Top 10 Security Issues and Threats for 2011

We've rung out the old and rung in the new. While the security landscape for 2011 includes a few paradigm-shifting new risks, we must also note familiar vulnerabilities.

Download White Paper

Does Your Company Have a Mobile Security Policy?

An emerging risk is the increased use of portable media in the enterprise. How are you allowing mobile device secure access your sensitive information resources? Use our template to help get started.

Download Template

NERC Cyber Security Standards What You Need To Know

The CIP Reliability Standards are often referred to as the NERC Cyber Security Standards. They are divided into eight specific areas (CIP-002 through CIP-009). These require certain users...

Download Data Sheet

Twitter Facebook Facebook