Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
How to Build an Application Security Risk Assessment Checklist That Passes Audits
Building an application security risk assessment checklist that passes audits starts with clear s...
Application Security Risk Assessment Checklist Template: Scope, Procedures, and Documentation
This application security risk assessment checklist template gives you a practical, end-to-end pa...
Security Risk Assessment Checklist for HIPAA: Identify, Prioritize, Remediate
HIPAA Security Risk Assessment Requirements. What HIPAA expects. Your organization must conduct...
Best Practices to Assess and Address Security Risks to ePHI
Protecting electronic protected health information (ePHI) demands a disciplined, continuous appro...
Examples and Requirements to Assess and Address HIPAA Security Risks
Scope the Assessment. Define the systems, people, and processes that create, receive, maintain, ...
HIPAA Security Risk Assessment and Mitigation: Step-by-Step Guide
Scope the Assessment. Define objectives and boundaries. Clarify why you are performing a HIPAA ...
How to Conduct an AI Security Risk Assessment for HIPAA-Covered Healthcare Organizations
An effective AI security risk assessment helps you harness clinical AI safely while meeting the H...
AI Security Risk Assessment Checklist: Protect PHI and Meet HIPAA Standards
Breach Notification and Compliance Audit. Establish a breach notification program that anticipat...
Cloud Code Risk Assessment Explained: HIPAA Requirements, Steps, and Examples
A cloud code risk assessment helps you identify how application code, pipelines, and cloud servic...
Practical Security Risk Assessment Example for HIPAA Compliance: Worksheet and Walkthrough
HIPAA Security Risk Assessment Overview. This practical security risk assessment example for HIP...
Cloud Code Security Risk Assessment Checklist for HIPAA-Regulated Organizations
HIPAA Security Rule Compliance. Use this checklist to align your cloud code security program wit...
Best Practices to Evaluate Cloud Application Code Risks for HIPAA Compliance
Evaluating cloud application code for HIPAA compliance means proving that security and privacy co...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security