Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/10/2010
03:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Accuvant Launches HIPAA/HITECH Alignment Services

Services can assist clients through the cycle of reviewing requirements and building appropriate policies and practices

DENVER – June 9, 2010 – Accuvant, the only research-driven information security partner delivering alignment, clarity and confidence to enterprise clients, announced today the availability of its HIPAA/HITECH Alignment Services. This new offering is intended for hospitals, behavioral health sciences organizations, doctors’ offices and business associates that need to address the Health Information Technology for Economic and Clinical Health (HITECH) provisions within the American Recovery and Reinvestment Act (ARRA) of 2009. “In addition to stricter requirements for protecting patient information, increased fines for non-compliance and new breach notification protocols, HITECH extends the reach of HIPAA (Health Insurance Portability and Accountability Act) requirements to business associates of covered entities, subjecting them to the same civil and criminal penalties,” said Doug Landoll, director of Accuvant’s Risk and Compliance Management practice. “Accuvant’s new HIPAA/HITECH Alignment Services can help clients sort out how to address the new provisions so they can avoid fines, prevent lost stimulus funding and ensure their systems are in compliance ongoing.” Accuvant’s HIPAA/HITECH Alignment Services can assist clients through the cycle of reviewing requirements and building appropriate policies and practices that adhere to HITECH standards. Additionally, because of Accuvant’s unique and proprietary methodologies, organizations may be able to incorporate compliance reviews of other standards such as PCI and in some cases, demonstrate meaningful use for ARRA incentives. “Our HIPAA/HITECH Alignment Services consolidate the requirements for HITECH, HIPAA and PCI, significantly reducing the complexity of health care compliance,” said Evan Tegethoff, solutions architect for Accuvant’s Risk and Compliance Management practice. “When our clients clearly understand their compliance requirements, they are in the best position to make security decisions and technology purchases that best fit the needs of their organization immediately as well as over the long term, which supports the greatest return on investment.” Accuvant’s Risk and Compliance Management team helps companies across industry verticals and sizes resolve their most challenging compliance issues, understand their ongoing risk and implement solutions that incorporate people, policy and technology for optimal business outcomes. About Accuvant Accuvant is the only research-driven information security partner delivering alignment between IT security and business objectives, clarity to complex security challenges and confidence in enterprise security decisions. Accuvant delivers these solutions through three practice areas: Risk and Compliance Management, Accuvant LABS and Technology Solutions . Based on our clients’ unique requirements, Accuvant assesses, architects and implements the policies, procedures and technologies that most efficiently and effectively protect valuable data assets. Since 2002, more than 2,500 organizations, including 35 of the Fortune 100, have trusted Accuvant with their data security challenges. Headquartered in Denver, Accuvant has offices in 28 cities across the United States. For more information, please visit www.accuvant.com , follow us on Twitter: @accuvant, or keep in touch via Facebook: http://tiny.cc/facebook553.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.