1 / 1

Is WordPress HIPAA Compliant?

So why are healthcare-related WordPress sites particularly susceptible to cyberattack? Simply because at its core, out-of-the-box WordPress software is not secure for the storage or transfer of protected health information (PHI).<br><br>

hipaavault
Download Presentation

Is WordPress HIPAA Compliant?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Is WordPress HIPAA Compliant? So why are healthcare- related WordPress sites particularly susceptible to cyberattack? Simply because at its core, out-of-the-box WordPress software is not secure for the storage or transfer of protected health information (PHI). www.hipaavault.com Secure Access It should go without saying (but we say it anyway) that the passwords used to access your site must be secure. Username/password combinations are still the most common target for attack, so making it easy for hackers to guess weak passwords (like ‘password123’ or ‘opensesame’) is simply asking for trouble. Assign Permissions In this way, even if a user or plugin is compromised, it will only allow access to a limited set of resources, rather than all of your controls and data. This will help protect your system and prevent someone from gaining access to sensitive information. Provide In-Depth Defense A last general precaution (though certainly not least overall) is to ensure in-depth defense, or multiple layers of security for your system. The advantage here is that each layer of security can address the shortfalls of that particular layer. For example, a HIPAA Compliant environment will require a host database to have a dedicated IP Address separate from where the content resides.

More Related