GRC

Health Insurance Portability and Accountability Act (HIPAA) Compliance

Ensure confidentiality, integrity, and availability of PHI with confidence.

Health Insurance Portability and Accountability Act (HIPAA) security regulations have caused organizations to scrutinize how they secure and employ their information technology. In response, progressive health care organizations engage experts to assist with HIPAA compliance and use the opportunity to improve information technology management.

Wipfli experts assist organizations with completing the required HIPAA security risk assessment, including review of your security program, technology environment, and facility and environmental controls. Results are summarized and included in a report with details about identified risks and remediation activities.

Learn more about Wipfli's Cybersecurity ServicesBusiness Continuity, and Fraud & Forensic Services.
 

Featured Thought Leader

Rick Ensenbach, CISSP, CISA, CISM, ISSMP, CCSFP

Rick is a career information security professional with over 35 years of experience working in health and financial industries, state and federal government, and for the U.S. Air Force. Rick brings thought leadership, practical hands on experience, and in-depth knowledge of program management, industry standards, realistic best practices and regulatory compliance to his clients. Rick has a reputation of establishing very long term working relationships with his clients.

Paul J. Johnson, CISSP, CCSFP, CPA

Paul Johnson works with clients to assess, improve, and test their information security and risk management systems. He also helps clients determine their compliance with health care security requirements including HIPAA and HITRUST.

Featured Insight

Does Your Health Care Organization Struggle with Risk Management?

We’ve discovered four common mistakes that health care organizations take with information risk management. Learn what they are — and what you can do to mitigate them.

Featured Insight

Why Measuring Needs to Be a Standard of Your Information Security Program

Monitoring your information systems to detect abnormalities plays just a single role in a comprehensive information security program. It’s the proactive step of measuring that most determines the effectiveness of your controls and the likelihood of a security incident.