Security Risk Mitigation

[mp_row] [mp_span col="12"] [mp_text]

So you’ve completed your HIPAA Security Risk Analysis. You have identified the information assets, threats, and vulnerabilities. You have assessed the likelihood of occurrence and impact for each risk. And you have a remediation plan to address these risks. What’s next?

[/mp_text] [/mp_span] [/mp_row] [mp_row] [mp_span col="6"] [mp_row_inner] [mp_span_inner col="12"] [mp_image id="2139" size="full" link_type="custom_url" link="#" target="false" align="left"] [/mp_span_inner] [/mp_row_inner] [mp_row_inner] [mp_span_inner col="12"] [mp_text]

Ways to Deal with Risk

  1. Accept: Risks with a low risk score or mitigation is unreasonable for the organization.
  2. Avoid: Risks that can be eliminated.
  3. Shift Liability: e.g. Insurance or proper Business Associate Agreements
  4. Mitigate: Reduce likelihood of occurrence or impact
[/mp_text] [/mp_span_inner] [/mp_row_inner] [/mp_span] [mp_span col="6"] [mp_row_inner] [mp_span_inner col="12"] [mp_image id="1991" size="full" link_type="custom_url" link="#" target="false" align="left"] [/mp_span_inner] [/mp_row_inner] [mp_row_inner] [mp_span_inner col="12"] [mp_text]

What is mitigation?

It is impossible to completely eliminate all of your risk. But it is not impossible to minimize your exposure by reducing the likelihood of occurrence and/or the impact. This is called mitigation. 

[/mp_text] [/mp_span_inner] [/mp_row_inner] [/mp_span] [/mp_row] [mp_row] [mp_span col="6"] [mp_row_inner] [mp_span_inner col="12"] [mp_image id="1985" size="full" link_type="custom_url" link="#" target="false" align="left"] [/mp_span_inner] [/mp_row_inner] [mp_row_inner] [mp_span_inner col="12"] [mp_text]

The Importance of Documentation

Whatever you do to mitigate your risks, document your efforts. Not only a check mark noting completion of the tasks. Document also the progress of your efforts towards completion. These notes will come in handy in the future as you monitor the effectiveness of your mitigation efforts. 

[/mp_text] [/mp_span_inner] [/mp_row_inner] [/mp_span] [mp_span col="6"] [mp_row_inner] [mp_span_inner col="12"] [mp_image id="1983" size="full" link_type="custom_url" link="#" target="false" align="left"] [/mp_span_inner] [/mp_row_inner] [mp_row_inner] [mp_span_inner col="12"] [mp_text]

How We Can Help

We have the tools, knowledge, and experience to support your risk mitigation efforts. Even if you do much of the mitigation work on your own or involve your existing technical support team, you may want us to review the results and “sign off” on completion of the tasks. We’ll customize a service engagement to match your needs, goals, and budget.

[/mp_text] [/mp_span_inner] [/mp_row_inner] [/mp_span] [/mp_row]