Resource Overview

Conducting an SRA in accordance with HIPAA policy is a complex task, especially for small to medium providers such as community health centers. The HIPAA Security Rule mandates security standards to safeguard electronic Protected Health Information (ePHI) maintained by electronic health record (EHR) technology, with detailed attention to how ePHI is stored, accessed, transmitted, and audited. This rule is different from the HIPAA Privacy Rule, which requires safeguards to protect the privacy of PHI and sets limits and conditions on it use and disclosure. Meaningful Use supports the HIPAA Security Rule. In order to successfully attest to Meaningful Use, providers must conduct a security risk assessment (SRA), implement updates as needed, and correctly identify security deficiencies. By conducting an SRA regularly, providers can identify and document potential threats and vulnerabilities related to data security, and develop a plan of action to mitigate them.

Security vulnerabilities must be addressed before the SRA can be considered complete. Providers must document the process and steps taken to mitigate risks in three main areas: administration, physical environment, and technical hardware and software. The following set of resources provide education, strategies and tools for conducting SRA.

Security Risk Analysis Resources
Event date: 4/4/2023 1:00 PM - 2:00 PM Export event
Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation and Response - Session 2: Health Center Hacking Combat and Breach Response Strategies

Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation and Response - Session 2: Health Center Hacking Combat and Breach Response Strategies

HITEQ Learning Collaborative Series

It's time to reconsider your strategy if you still treat cyber risk as an annual project or initiative. Having a thorough ongoing program in place means that even in the worst-case scenario, you'll be ready to demonstrate that you did what was reasonable and appropriate to protect your systems and patient data. Nothing can guarantee that a cyberattack won't become a breach. Health Centers are a domain with a high potential for data breaches. As a result, it is crucial for health center leadership to adopt breach prevention strategies across their entire organization, as opposed to relegating it to the IT department. 

To support health centers in their cybersecurity strategy and implementation, the HITEQ Center is offering a free learning collaborative -- Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation, and Response. This learning collaborative will involve four structured virtual learning sessions. During the series participants will engage with subject matter experts and their colleagues in peer-to-peer learning and discussion. Topics will include: health center breach mitigation tactics, operationalizing cybersecurity to better mitigate risks, telehealth risk management strategies, and incident response planning from a cybersecurity perspective.

After participating in this session, attendees will be able to:

  • Describe resources, frameworks, and methods for strategic implementation of cybersecurity infrastructure and services.
  • Describe essential cybersecurity tools and services that can help decrease the risk of a data breach.
  • Use best practices in cybersecurity when implementing modern telehealth tools and RPM initiatives.
  • Adopt cybersecurity risk management paradigms and incident response planning templates.

Session 2: Health Center Hacking Combat and Breach Response Strategies for Awareness, Management, and Training

In this session, we will discuss breach mitigation, ways in which to operationalize cybersecurity in order to better mitigate risks, review risk management tools, and methods for defending against cybersecurity attacks. Breach can occur through both internal and external network leaks, through malware such as ransomware and through physical means on site. We will cover topics related to general knowledge about breach mitigation, methods for mitigating against breach incidences, and addressing gaps in health center defenses.

Previous Article Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation and Response - Session 4: Cybersecurity Incident Response Planning for Health Centers
Next Article Security 101: Security Risk Analysis

Leave a comment

This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data.
Add comment


This resource collection was cultivated and developed by the HITEQ team with valuable suggestions and contributions from HITEQ Project collaborators.

Looking for something different or have something you think could assist?

HITEQ works to provide top quality resources, but know your needs can be specific. If you are just not finding the right resource or have a highly explicit need then please use the Request a Resource button below so that we can try to better understand your requirements.

If on the other hand you know of a great resource already or have one that you have developed then please get in touch with us by clicking on the Share a Resource button below. We are always on the hunt for tools that can better server Health Centers.

Request a Resource  Share a Resource
Learning Progress
Quick Feedback Request
Highlighted Resources & Events
Need Assistance?
Would you like more assistance regarding Privacy and Security strategies or support in using any of the include resource sets?

  Request Support


The Quadruple Aim
Quadruple Aim

A Conceptual Framework

Improving the U.S. health care system requires four aims: improving the experience of care, improving the health of populations, reducing per capita costs and improving care team well-being. HITEQ Center resources seek to provide content and direction aligned with the goals of the Quadruple Aim

Learn More >