Blog
Hospice Vulnerability Management: Best Practices to Protect PHI and Meet HIPAA
Secure hospice PHI with HIPAA vulnerability management: training, risk assessments, vendor BAAs, ...
MOLST Form and HIPAA: What You Need to Know About Privacy, Access, and Sharing
Learn how a MOLST form interacts with HIPAA, who can access it, and how to protect confidentialit...
How to Threat-Model and Scan Cloud Code Risks for HIPAA Readiness
HIPAA readiness starts by understanding how your cloud services handle protected health informati...
AI Security Risk Assessment Explained: Common Risks, Controls, and Compliance Examples
An AI security risk assessment helps you identify, analyze, and treat threats that affect confide...
HIPAA-Focused AI Security Risk Assessment Guide for Clinics and Health Systems
This HIPAA-Focused AI Security Risk Assessment Guide for Clinics and Health Systems shows you how...
How to Assess Cloud Code Security Risks: A HIPAA-Compliant Guide
Assessing cloud code security risks demands a balance between robust engineering and regulatory d...
Selecting a HIPAA Security Risk Assessment Tool: Criteria, Costs, and ROI
Choosing the right platform for selecting a HIPAA security risk assessment tool determines how qu...
HIPAA Security Risk Assessment Tool Explained: Features, Templates, and Compliance Examples
Overview of the HIPAA Security Risk Assessment Tool. What it is and why it matters. The HIPAA S...
HIPAA Security Risk Assessment Tool: How to Conduct an OCR-Ready SRA
SRA Tool Overview. The HIPAA Security Risk Assessment Tool helps you examine how your organizati...
Types of Security Risk Assessments: HIPAA-Compliant Approaches Explained for Healthcare
HIPAA Security Risk Assessment. Purpose and scope. A HIPAA Security Risk Assessment (SRA) evalu...
Choosing the Right Security Risk Assessment Type for HIPAA Compliance
Overview of HIPAA Security Risk Assessments. Choosing the right security risk assessment type fo...
Security Risk Assessment Types for PHI: A Practical HIPAA Guide
Protecting protected health information (PHI) and electronic PHI (ePHI) begins with a clear, repe...
Administrative, Technical, and Physical: HIPAA Security Risk Assessment Types Explained
HIPAA’s Security Rule organizes safeguards into three assessment types—administrative, technical,...
HIPAA Security Risk Assessment Example: Step-by-Step Guide with Templates
Setting Assessment Scope. This HIPAA security risk assessment example shows you how to scope, an...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security