CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

How to Prepare for the Incoming Wave of HIPAA Audits

I joined some colleagues from Trustwave last week in Orlando, Fla. for HIMSS14, one of the nation's premier health care IT conferences. And wouldn't you know it? Educational sessions that focused on privacy and security of electronic health records were very popular at the show.

Many interesting observations could be gleaned from the conference, but I'll share what I believe to be the biggest: The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is ramping up its Health Insurance Portability and Accountability Act (HIPAA) audit program, and business associates will be included in the set of organizations to be audited, alongside covered entities.

Speaking at HIMSS14, Susan McAndrew, deputy director for health information privacy for the OCR, said her agency is speeding up its hiring of auditors, and the pilot phase of the audit program will now give way to the development of a new, more targeted audit protocol.

As stated previously, and reiterated again last week at HIMSS, the new audit program will not be conducted using the protocol from the HIPAA audit pilot program. Instead, the new program will utilize new criteria that will force the audits to take a more targeted approach, focusing on the critical findings and key focus areas identified during the pilot phase.

Specifically, there will be an increased focus on risk assessments. This focus is a direct result of an analysis of the pilot program, which indicated organizations were conducting ineffective risk assessments and experiencing "nonperformance," placing them at risk of non-compliance with HIPAA.

Conducting a risk assessment is the first step in recognizing factors that may lead to HIPAA non-compliance. According to HIPAA, risk analysis is the basis for identifying safeguards and technologies to adequately protect health information and meet compliance standards and implementation specifications. The risk analysis requirement continues to be an area of struggle, as noted in the audit pilot program, and this shortcoming is further confirmed in results from "meaningful use" investigations and audits.

The OCR soon is expected to survey 1,200 organizations to determine which covered entities and business associates are suitable for this new round of audits. These audits are expected to begin in the spring and will serve as a bridge toward the formal audit program to be conducted in the fall by the OCR.

For more information on what's coming down the pike, or if you have questions, please feel free to reach out to me at cdbrown@trustwave.com.

Christoffer Brown is a solutions development specialist on the Compliance and Risk team at Trustwave.

Latest Trustwave Blogs

Trustwave Named a Trail Blazer in Radicati Secure Email Market Quadrant 2024 Report

Trustwave MailMarshal solidified its leadership position in the email security space, being named a Trail Blazer by the analyst firm Radicati Group in its Secure Email Market Quadrant 2024 report.

Read More

Trustwave, Telarus Announce Strategic Global Partnership

Trustwave is partnering with Telarus, a leading technology services distributor (TSD), which will allow it to leverage Trustwave’s comprehensive offensive and defensive cybersecurity portfolio and...

Read More

Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense

Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect...

Read More