Resources

Blog

Proposed HIPAA Update Makes Yearly Pen Testing Mandatory

In early 2025, significant changes to the HIPAA Security Rule were proposed by the Office of Civil Rights for the Department of Health and Human Services (OCR). The proposed update to the HIPAA Security Rule, published on January 6, 2025, introduces a significant new requirement: all covered entities and business associates must conduct penetration...
Blog

Adapting to a Changed World: 6 Cybersecurity Predictions for 2021

As a new year looms bright with possibility in front of us, how can we prepare for a world that looks profoundly different than it did a year ago? On the cybersecurity front, we can always anticipate continuing battles with familiar foes, as well as a few new challenges on the horizon. Though we may not have a crystal ball, based on our observations and discussions, here are six predictions for...
Case Study

From Surviving to Thriving: How a Large Healthcare Organization Established a Comprehensive Identity and Access Management Approach

Overview Healthcare organizations today face extraordinary challenges in a dynamic, complex landscape. During the last two decades, the healthcare industry has seen increasing regulations, an acceleration of technology and workforce growth, acquisitions and consolidation, and the pressure to increase operational efficiencies and decrease overall costs, while meeting growing patient demands....
Blog

Healthcare Identity Governance in the Era of COVID-19: Five Critical Issues Your Organization Can’t Afford to Overlook

The impact of COVID-19 has been far-reaching across nearly every sector. But none has been so greatly disrupted as the healthcare industry. Managing through this crisis has required healthcare systems to expand some aspects of their workforce and redeploy others virtually overnight in order to transform the way they offer services to patients. Redeploying resources, leveraging a mobile workforce,...
Blog

Interview with a Healthcare Security Expert: William "Buddy" Gillespie, HCISPP

In November we started a wonderful webinar series with industry leader William "Buddy" Gillespie, HCISPP and we introduced that series with a sit down interview. Yesterday, we concluded the series with a webinar titled "Healthcare 2020: Focus on the Future". While the webinar series may be over, our partnership with Buddy will continue and we would like to continue to showcase his knowledge...
Blog

How to Mitigate Data Breaches in Healthcare IT

What once was only science fiction is now our reality, anything and everything can be hacked. For healthcare providers, ‘anything’ includes not only patient records and claims information, but sentient things like drug pumps and pacemakers. In addition, healthcare has operational functionality that make this space particularly challenging. The mobility challenge is particularly unusual because the...
Blog

Students Safely Using Devices on Networks: Home, School and Business

The integration of technology in classrooms has changed school environments tremendously. It seems as if each year at earlier ages, students are more comfortable using a tablet than putting pen to paper. However, there’s more to be concerned with than kids growing up with poor penmanship. As we all know in the world of cyber security, no one is exempt from being the next victim of an attack. What...
Video

Healthcare Identity Governance 101: Six Proven Strategies for Tackling the Biggest Healthcare Information Security Challenges

Healthcare organizations today face extraordinary challenges in a complex landscape. With increasing regulations, the acceleration of technology, and the demand to do more with less, health systems must address these issues head on, while staying focused on delivering quality patient care. Data breaches in healthcare cost more than $6.45 million on average—higher than any other industry. So the...
Video

Intelligently Mitigate Your Biggest Healthcare Identity Risks

Take the next step in addressing your healthcare organization’s most pressing access-related risks. Watch this on-demand video to learn how you can reveal hidden access risks in your health system to arm yourself with actionable insights. By increasing your access risk intelligence, you can: Discover inappropriate access risks prior to internal audits. Diagnose access risks instantly, and gain...
Case Study

WellSpan Health

Overview WellSpan selected Core Security’s Identity Governance & Administration Solution to ensure that access to information, buildings and systems were given to the right people at the right time. Key Results Include: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...
Case Study

Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security

Overview A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds...
Case Study

Large Midwestern University

Overview Core Impact helped this large Midwestern University: Improve security holistically Find client side vulnerabilities Test web applications Ease PCI compliance
Case Study

Cigna-HealthSpring

Overview Cigna-HealthSpring chose Core Security to help the organization focus on maintaining compliance with federal regulations such as HIPAA, HITECH and SarbanesOxley while automating the user access process. With Compliance and Access Request, CignaHealthSpring can now: Automate manual user access review processes Easily analyze, review and certify user access enterprise-wide Protect...
Blog

Healthcare’s Unique Cyber Security Challenges

It’s no secret that healthcare organizations are constantly in the crosshairs of cyber criminals. One of the reasons healthcare records are 30 times more valuable than financial records is because they contain full identity profiles – including your social security number which is the gateway to acquiring any and all of your personal information. According to data gathered by the United States...
Guide

Doing Healthcare Identity Governance Right

Healthcare Organizations Face Extraordinary Challenges in a Dynamic, Complex Landscape During the last two decades, the healthcare industry has seen increasing regulations, an acceleration of technology, consolidation, and the pressure to increase operational efficiencies and decrease overall costs, while meeting growing patient demands. Addressing these issues, while staying focused on delivering...