Cyber threats and cybersecurity controls have evolved significantly over the past two decades since the HIPAA Security Rule were originally promulgated. During this same time, healthcare entities have increasingly become a prime target of hackers seeking to extort payment using ransomware, exfiltrate patient data to commit fraud, or disrupt operations in other nefarious ways. Recognizing these challenges, some security professionals have sought further clarity on the HIPAA Security Rule that they deem to be “long in the tooth”. Yet, regulators have not made any ...
According to a report by West Monroe Partners, approximately 40% of companies engaged in corporate transactions reported finding a cybersecurity issue during post-acquisition integration of the target company. While companies routinely conduct robust transactional due diligence to manage legal risk, many fail to adequately conduct cybersecurity due diligence. As a consequence, many companies and investors are leaving themselves vulnerable to potentially severe latent cyber risks.
Cybersecurity is especially relevant in healthcare transactions as the industry ...
Blog Editors
Recent Updates
- Podcast: 42 CFR Part 2 Final Rule: What’s Changing and What Do You Need to Know? – Diagnosing Health Care
- Congress Creates Yet Another Cliff for Medicare Telehealth Extensions (and We’re Running Out of Metaphors)
- OIRA Memo on Agency Deregulation: Implications for Health Care
- Outside Counsel’s Internal Investigations—Including Those Relating to Health Care—Are Privileged and Protected from Disclosure
- Podcast: Current Tailwinds in Women’s Health - What Do They Mean for Your Business? – Diagnosing Health Care