It’s Time to Examine Your HIPAA / HITECH Compliance

SystemExperts has been helping organizations of all sizes comply with complex regulations surrounding HIPAA and electronic Protected Health Information (ePHI) since 2007

Are you HIPAA/HITECH Compliant?

One of our consultants will get back to you shortly

Bringing an organization into compliance with HIPAA / HITECH is a daunting task that can paralyze productivity. The team at SystemExperts ensures fully documented compliance with the requirements of each rule, setting you up for success and letting your team focus on what’s important.

HIPAA & HITECH Security Compliance Consultants

SystemExperts helps organizations review and implement the security aspects of the following:

  • Security Rule Administrative Safeguards
  • Security Rule Physical Safeguards
  • Security Rule Technical Safeguards
  • Breach Notification Rule Requirements
  • Privacy Rule Requirements

Additional ISO 27002 Compliance Services

  • ISO 27002 Immersion Sessions – Conducting a one day comprehensive workshop to help organizations understand the ISO 27002 security requirements in their business context
  • Compliance Preparation – Providing advice and assistance with implementing a ISO 27002 compliant information security program
  • Security Awareness Training – Developing and delivering Security and Privacy Awareness Training
  • Vendor Risk Management Reviews – Performing ISO 27002 assessments on service providers and other third parties to ensure that they have sound security practices.

SystemExperts HIPAA / HITECH Services

  • HIPAA / HITECH Immersion Sessions – Conducting a one day comprehensive workshop to help organizations understand the HIPAA requirements as it relates to the organization’s business context
  • Compliance Preparation – Providing advice and assistance with implementing a HIPAA / HITECH compliant infrastructure and program
  • Business Associate Reviews – Performing HIPAA / HITECH reviews on business associates, service providers, and other third parties to ensure that they provide HIPAA / HITECH compliant services.

SystemExperts PCI Consulting Step-by-Step Approach

  • Identify business and client data, including cardholder information
  • Analyze the boundaries of cardholder data environment
  • Assess the operating controls that protect the confidentiality and integrity of all cardholder data against the PCI requirements
  • Provide guidance on remediation activities that achieve cost-effective compliance with the PCI requirements
  • Assist with the completion of the PCI Attestation of Compliance
  • Provide a PCI Compliance Certification Letter

Getting Started is Easy

    1. Scope the project and schedule a start date
    2. Kick off the project with a Conference Call
    3. Enumerate with a Network Discovery & IP Services Inventory
    4. Perform the Vulnerability Assessment and provide the report
    5. Review the report with your team
    6. Provide the Testing Certification Letter

Our Step-by-Step Approach

  1. Determine scope of project and target timeline
  2. Assess current HIPAA / HITECH compliance status
  3. Provide guidance on remediation efforts
  4. Provide HIPAA Certification Letter

SystemExperts has been in business since 1994, helping clients see the big picture and design solutions to meet their comprehensive security needs. We over-deliver and provide unmatched personal attention, distilling problems to their root causes and recommending what’s appropriate for you.

IP Services Inventory

Larger organizations often lose track of the IP-based services they have on their network. Periodic scanning of address space enables you to better manage your exposure by highlighting unnecessary security vulnerabilities.

As part of our penetration testing services, SystemExperts scans your IP address space for IP-based services. For each IP address scanned, we look for services available on all TCP and well-known UDP ports. We categorize whether service is open (reachable) or closed (unreachable). Once testing is complete, you receive a table containing the IP Services Inventory.

You may choose to remove any unexpected/unnecessary services we find during the scan. After adjusting your list, you can provide us with a re-scan list. We then rescan the IP addresses on the list and update the IP Services Inventory table to reflect changes.

Firewall Review

Firewall rules tend to grow gradually in layers. Changes to the rules are made to support the evolving needs of the business and by nature accumulate over time. The result of this process is too often:

  • The rule set grows too large to be readily understood
  • Later rules contradict the earlier rules
  • A particular business need that required a specific opening in the firewall no longer exists, but the opening remains as a historical artifact.

We work with you to document how the firewall should function and review the configuration to determine if it is consistent with the expected behavior.

It’s Time to Examine Your HIPAA / HITECH Compliance

SystemExperts has been helping organizations of all sizes comply with complex regulations surrounding HIPAA and electronic Protected Health Information (ePHI) since 2007

Are you HIPAA/HITECH Compliant?

One of our consultants will get back to you shortly