Kevin Henry | Accountable Author

Product Pricing
Ready to get started? Book a demo with our team
Talk to an expert
HIPAA-Compliant Vulnerability Scanning for Mac Systems: A Practical Guide
HIPAA Apr 14, 2026

HIPAA-Compliant Vulnerability Scanning for Mac Systems: A Practical Guide

HIPAA Compliance Requirements for Vulnerability Scanning. Vulnerability scanning supports the HI...

HIPAA Vulnerability Scanning: Outdated Software Risks and How to Fix Them
HIPAA Apr 14, 2026

HIPAA Vulnerability Scanning: Outdated Software Risks and How to Fix Them

HIPAA Vulnerability Scanning Overview. HIPAA vulnerability scanning is a structured process to i...

2025 HIPAA Vulnerability Scanning Requirements: Frequency, Scope, and Documentation
HIPAA Apr 14, 2026

2025 HIPAA Vulnerability Scanning Requirements: Frequency, Scope, and Documentation

Vulnerability Scanning Frequency. HIPAA’s Security Rule remains risk-based. In 2025, auditors ex...

HIPAA Compliance for Hypnotherapy Practices: A Complete Guide to Requirements and Best Practices
HIPAA Apr 14, 2026

HIPAA Compliance for Hypnotherapy Practices: A Complete Guide to Requirements and Best Practices

HIPAA Applicability to Hypnotherapists. When HIPAA applies. HIPAA applies to you if you are a h...

HIPAA Vulnerability Scanning for Physician Practices: How to Stay Compliant and Protect Patient Data
HIPAA Apr 14, 2026

HIPAA Vulnerability Scanning for Physician Practices: How to Stay Compliant and Protect Patient Data

Physician practices handle high volumes of electronic protected health information (ePHI), making...

What Is a HIPAA Penetration Test? Definition, Requirements, and How It Works
HIPAA Apr 13, 2026

What Is a HIPAA Penetration Test? Definition, Requirements, and How It Works

Definition of HIPAA Penetration Testing. A HIPAA penetration test is a controlled, adversary-sim...

HIPAA Vulnerability Scanning for Weak Passwords: Requirements, Tools, and Best Practices
HIPAA Apr 13, 2026

HIPAA Vulnerability Scanning for Weak Passwords: Requirements, Tools, and Best Practices

HIPAA Vulnerability Scanning Overview. HIPAA vulnerability scanning for weak passwords helps you...

Can I Do My Own HIPAA Vulnerability Scan? Requirements, Steps, and When to Hire a Pro
HIPAA Apr 13, 2026

Can I Do My Own HIPAA Vulnerability Scan? Requirements, Steps, and When to Hire a Pro

You can perform your own HIPAA vulnerability scan if you meet core HIPAA security rule requiremen...

HIPAA Protection for Metabolomic Data: What Counts as PHI and How to Stay Compliant
HIPAA Apr 13, 2026

HIPAA Protection for Metabolomic Data: What Counts as PHI and How to Stay Compliant

Definition of Protected Health Information. Protected Health Information (PHI) is Individually I...

Mobile Security Best Practices for Therapy Practices: A HIPAA-Compliant Guide
HIPAA Apr 13, 2026

Mobile Security Best Practices for Therapy Practices: A HIPAA-Compliant Guide

Mobile devices help you deliver timely, patient-centered care, but they also expand your risk sur...

How Often Should You Perform HIPAA Vulnerability Scans?
HIPAA Apr 13, 2026

How Often Should You Perform HIPAA Vulnerability Scans?

HIPAA Vulnerability Scanning Frequency. What HIPAA requires (and what it doesn’t). HIPAA’s Secu...

Texas HIPAA Penetration Testing Services: Stay Compliant and Secure PHI
HIPAA Apr 12, 2026

Texas HIPAA Penetration Testing Services: Stay Compliant and Secure PHI

Overview of HIPAA Penetration Testing. HIPAA does not prescribe a specific penetration test, but...

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Kevin Henry

Kevin Henry

CEO @Accountable

As founder and CEO of Accountable, Kevin leads our mission to simplify HIPAA compliance for healthcare organizations. With a background in healthcare technology and healthcare, he has been instrumental in developing innovative solutions that make compliance accessible and manageable for organizations of all sizes.