Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
EHR Incentive Program SRA Checklist: What to Document, Validate, and Remediate
Mandatory Annual Security Risk Assessment. Your security risk analysis (SRA) is an annual, non-n...
Security Risk Analysis for EHR Incentive Program: Step-by-Step Compliance Guide
Security Risk Analysis Requirement. A Security Risk Analysis (SRA) is a foundational requirement...
IT Security Threat and Risk Assessment Checklist for Healthcare Compliance Teams
Use this IT security threat and risk assessment checklist to evaluate how well your organization ...
OCR-Compliant HIPAA Security Risk Assessment Steps: Process, Documentation, and Remediation
Evaluate Current HIPAA Risk Assessment. Confirm scope and completeness. Start by reviewing whet...
HIPAA Security Risk Assessment Examples and Best Practices for Small Dental Practices
Conducting Risk Analysis. A HIPAA security risk analysis helps you identify where electronic pro...
HIPAA Security Risk Assessment Explained for Small Dental Practice Owners
Understanding HIPAA Security Risk Assessment Requirement. A HIPAA security risk assessment is th...
IT Security Threat and Risk Assessment for HIPAA: Complete Guide
An effective IT security threat and risk assessment for HIPAA helps you protect electronic protec...
How to Perform an IT Security Threat and Risk Assessment for Healthcare
Performing an IT security threat and risk assessment for healthcare helps you protect patient dat...
HIPAA Physical Security Risk Assessment Guide: Steps, Examples, and Checklist
This HIPAA Physical Security Risk Assessment Guide walks you through a practical, auditable proce...
Physical Security Risk Assessment for HIPAA: Requirements and Best Practices
HIPAA Physical Security Requirements. A physical security risk assessment for HIPAA helps you ve...
HIPAA-Compliant IT Security Threat and Risk Assessment: Steps and Requirements
When your organization creates, receives, maintains, or transmits electronic protected health inf...
IT Security Threat and Risk Assessment Best Practices with Healthcare Examples
Holistic IT Risk Assessment Approach. Define scope and map data flows. You begin by identifying...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security