The Blog
When I first started developing HIPAA compliant software I had been developing custom software for 9 years. But I had never had to develop a HIPAA compliant solution. Like a lot things ...
Continue Reading
Picking up on the theme from a few days ago, let's tell another story about a time I went head to head with an MCO and lost: HITRUST Certification.
You might be beginning ...
Continue Reading
If you are looking to embark on HITRUST Certification, you'll be spending a lot of time on your IT Policy. This is arguably the most important part of the HITRUST Certification (whether it should ...
Continue Reading
"So how was the HITRUST Conference?" I asked the Network/Server Admin I tasked with the initial HITRUST requirement fact finding.
"They expressed a lot of doubt that we were going to be able to do ...
Continue Reading
I have mentioned before (and will continue to) that HITRUST Certification didn't secure the system itself; rather, it codified and proved out the existing security apparatus. However, one could argue that it made the ...
Continue Reading
If the first question when first considering HITRUST Certification is how much will this cost, the second question is how long will it take? It's a valid question. Any project you take on should ...
Continue Reading
You have achieved HITRUST Certification. Great! But now the real hard part comes: adhering to your new policy. Do not underestimate the importance of this.
HITRUST Certification follows a validated assessment every ...
Continue Reading
As we come to our 7th and final article in the HITRUST Certification series, we come to the last question: Is HITRUST Certification really necessary?
Truthfully.
No.
"What?!? You just spent 6 other articles espousing what it ...
Continue Reading
Many years ago (before Apple's second surge) I would sit around and listen to technology minded individuals have very passionate arguments about which was better: Microsoft, Mac, or Linux. I was always perplexed ...
Continue Reading