This website uses cookies to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
READ MORE
OKAY, I AGREE

Cloud Security Assessment Services

CyberCrest provides comprehensive cloud security assessments to help organizations evaluate and manage cloud security risks and align cloud security practices with compliance requirements. Our team of cloud security experts utilize industry-leading tools and techniques to identify vulnerabilities and misconfigurations in your cloud infrastructure, applications, and data. We deliver actionable recommendations to improve your security posture, ensure regulatory compliance, and protect your critical assets in the cloud.

TESTIMONIALS

Hear from Our Clients

01
/
03

I have worked with CyberCrest on multiple compliance engagements over the past several years including HITRUST, NIS 2 and ISO 27001. Without exception, CyberCrest has consistently exceeded expectations for my clients through a combination of highly experienced consultants, and a practical approach to achieving compliance. They are willing to roll up their sleeves and help organizations fully understand and address their compliance challenges, not just function as external auditors.

Paul Lucidi

Founder and President, CyberAge Consulting LLC

“I have used the CyberCrest team for a variety of critical information security compliance engagements over the years including successfully attaining ISO 27001 and HITRUST certifications. All of our engagements have exceeded expectations!”

Craig Guinasso

Senior Director, Technology & CyberSecurity, Alector

"We have worked with CyberCrest on multiple penetration testing and cybersecurity risk and maturity assessments. The CyberCrest team has consistently produced high quality deliverables at fair prices. We give their client prospects our strongest recommendation."

David Wise

Managing Partner, Aberdeen Advisors

I have worked with CyberCrest on multiple compliance engagements over the past several years including HITRUST, NIS 2 and ISO 27001. Without exception, CyberCrest has consistently exceeded expectations for my clients through a combination of highly experienced consultants, and a practical approach to achieving compliance. They are willing to roll up their sleeves and help organizations fully understand and address their compliance challenges, not just function as external auditors.

Paul Lucidi

Founder and President, CyberAge Consulting LLC

“I have used the CyberCrest team for a variety of critical information security compliance engagements over the years including successfully attaining ISO 27001 and HITRUST certifications. All of our engagements have exceeded expectations!”

Craig Guinasso

Senior Director, Technology & CyberSecurity, Alector

"We have worked with CyberCrest on multiple penetration testing and cybersecurity risk and maturity assessments. The CyberCrest team has consistently produced high quality deliverables at fair prices. We give their client prospects our strongest recommendation."

David Wise

Managing Partner, Aberdeen Advisors

Frequently asked questions

What is Protected Health Information (PHI)? What are some examples of PHI?

According to the U.S. Department of Health and Human Services (HHS), Protected Health Information (PHI) is defined as “individually identifiable health information” that is held or transmitted by a covered entity or its business associate, in any form or medium. In simple terms, PHI is any information related to an individual’s health or health care that can be used to identify the individual and is protected under HIPAA laws and regulations. The HIPAA Security Rule is typically concerned with Electronic Protected Health Information (ePHI). Examples of PHI include name, address, date of birth, Social Security number, medical record number, health insurance information, and any other information that can be used to identify a person and is related to their health or healthcare.

Personally Identifiable Information (PII) refers to information that can be used to identify an individual. It includes information such as full name, social security number, driver’s license number, email address, and other similar information. On the other hand, Protected Health Information (PHI) is a specific category of PII that relates to an individual’s health information, including demographic information, medical history, test results, and other similar information collected by healthcare providers and healthcare entities. PII becomes PHI as soon as healthcare information can be attached to a PII record either directly or through context. For example, a list of first and last names is only considered PII, but if the list of first and last names is in a file called “Dr. Smith’s Patients”, then it may be considered PHI because a reader of the file can determine uniquely identifiable individuals and identify information about the provision of healthcare to those individuals.

Does HIPAA Require ePHI to be encrypted?

According to the HIPAA Security Rule, encryption is considered an “addressable” safeguard for protecting PHI. This means that covered entities must evaluate whether encryption is reasonable and appropriate for their specific needs, taking into account their risk assessment and analysis results. If encryption is determined to be reasonable and appropriate, then it must be implemented. In most cases, encrypting ePHI at-rest and in-transit is a good idea.

Encryption is one of the technical safeguards under the HIPAA Security Rule that aims to protect PHI at rest and in transit. Encryption of PHI at rest refers to protection of electronic PHI stored on devices and media, while encryption in transit refers to protection of electronic PHI as it is transmitted over electronic networks.

If encryption is not determined to be reasonable and appropriate, covered entities and business associates must implement alternative equivalent measures to protect the confidentiality, integrity and availability of PHI, such as unique access codes or firewalls.

In summary, HIPAA does not require encryption for PHI but it is considered an addressable safeguard, meaning that it must be evaluated for implementation based on the results of the risk assessment and analysis. If encryption is deemed necessary, it must be implemented to protect the confidentiality, integrity, and availability of PHI. CyberCrest can conduct a HIPAA risk analysis and compliance gap assessment to determine whether encryption is appropriate for your organization and support your organization with encrypting PHI as needed.

What is a HIPAA Business Associate? Do I need a Business Associate Agreement?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularized in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. Contrary to popular belief, Lorem Ipsum is not simply random text.

Does HIPAA require penetration testing?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularized in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. Contrary to popular belief, Lorem Ipsum is not simply random text.

What is HIPAA Compliance?

HIPAA (Health Insurance Portability and Accountability Act) is a federal law that provides guidelines and regulations aimed at protecting the privacy and security of individually identifiable health information. This law applies to covered entities such as healthcare providers, healthcare clearinghouses, and health plans and their business associates.

HIPAA regulations are divided into two primary categories: the Privacy Rule and the Security Rule. The Privacy Rule sets standards for how protected health information (PHI) can be used and disclosed. The Security Rule, on the other hand, requires covered entities and their business associates to implement administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of electronic PHI (ePHI).

HIPAA compliance in the technology world typically refers to requirements for business associates to implement the Security Rule. This includes implementing access controls, conducting risk analyses, and regularly reviewing and updating security policies and procedures.

The purpose of HIPAA compliance is to protect sensitive patient information, maintain the privacy and security of PHI, and to avoid costly fines and penalties for non-compliance. Demonstrating HIPAA compliance is important for organizations in the healthcare industry as it shows their commitment to protecting patient data and reinforces their trust with customers, partners, and stakeholders.

At CyberCrest, we understand the complexities of HIPAA compliance. We are here to help you achieve and maintain compliance with ease. Our team of experts will work with you to assess your organization’s compliance status, implement best practices, and ensure that your patient information is secure in accordance with the HIPAA Security Rule. With our comprehensive range of services and expertise, you can rest assured that your organization is fully protected and compliant with HIPAA.