!DOCTYPE html> CDSystems


Anyone in Healthcare, including Doctors, Clinics, Psychologists, Dentists, Chiropractors, Nursing Homes, Pharmacies and other healthcare professionals face a wide range of operational, strategic and regulatory challenges and is subject to the Health Insurance Portability and Accountability Act of 1996 and requires Any entity that performs functions or activities that involve the use or disclosure of PHI on behalf of, or provides services to, a Covered Entity.

This is important because it is not optional. Organizations who must comply with HIPAA regulations must, by law, perform risk assessments and engage in ongoing risk management activities. Also, Fines are real – HIPAA fines can be categorized as “unknowing” all the way to “willfully negligent” with individual fines ranging from $1,000 to at least $50,000 per occurrence. Several recent breaches have resulted in multi‐million‐dollar fines. Addressing risk upfront helps you steer clear of fines.

How can we help? We can perform a HIPAA Security Assessment – Our risk assessments will help you adhere to HIPAA Security Rule §164.308(a)(1)(ii)(A) which requires covered entities and business associates to “conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information.”

Identify Gaps between the existing environment and the HIPAA Security Rule.

Develop a roadmap for remediating gaps in HIPAA compliance.

Pass an audit – Find problem areas so you can make adjustments before you get audited.

What's Included?

The HIPAA Security Assessment includes:

Correlation of your business objectives, its departments, and its workflows.

Mapping how data is ingested, stored, and transmitted.

Interviewing key personnel – People play a large part in cybersecurity.

Configuration review of critical IT infrastructure.

What‐if scenarios – What if we contracted ransomware? What if we lost power? What if a storm took out our datacenter? What if an unencrypted mobile device was left in a cab?

Internal and external vulnerability scanning – Prioritized reporting of all discovered technical vulnerabilities, both internal and internet‐facing.

C‐level and granular reporting – Executive‐level summary as well as detailed reporting.

Working together with you, we work to safeguard your assets, protect your reputations, and allow you to pursue your strategic and fiscal objectives with confidence.

Contact CDSystems so you can focus on the business of making money!


New York, NY