Can e-signatures be used in healthcare settings under HIPAA? Absolutely! E-signatures are permitted under HIPAA regulations, provided there are safeguards in place to confirm the signer's identity, ensure the document meets legal requirements, and protect any PHI from unauthorized access and disclosure.
Idenhaus Consulting
IT Services and IT Consulting
An Inc. 5000 Company. We get Cybersecurity and Identity Management done right, the first time!
About us
Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting. We help our clients solve their most challenging IT security problems and avoid the most common pitfalls. The goal is to take the pain out of implementation by using experienced consultants who follow a mature methodology and lead teams from initiation through implementation. The Idenhaus team provides the process and structure necessary to give your organization confidence in the project and provide peace of mind. We are experts at finding ways to reduce the complexity and cost of managing access to systems while enhancing security at the same time. Together, we will work with you to greatly reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance, and safeguard your customer information. Our team also provides FedRAMP advisory services from the initial assessment through FedRAMP Authorization and also provides compliance and assessment services for CMMC, CJIS, NIST, and ISO27001.
- Website
-
http://www.idenhaus.com
External link for Idenhaus Consulting
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Type
- Privately Held
- Founded
- 2014
- Specialties
- Identity Management, IT Strategy, Information Security, Cyber, Cybersecurity, Architecture, SOC II, Access Management, SAS 70, SASE 16, Consulting, Cloud, AWS, NERC, NIST, ISO27001, RBAC, HITRUST, PCI DSS, Risk Management, Risk Assessment, FedRAMP, CJIS, Governance, IGA, IDM, IAM, and PCI
Locations
-
Primary
-
Atlanta, GA 30306, US
-
Dallas, TX, US
-
RTP, NC, US
Employees at Idenhaus Consulting
-
Jerry Combs, CISSP
Chief Architect at Idenhaus Consulting, LLC
-
Nicole Keaton Hart
Chief Strategy Officer @Microsoft | Board Chair - Healthcare P&L Oversight | Chief Storyteller | Board Advisor -…
-
Hanno Ekdahl
Founder @ Idenhaus Consulting, LLC | Cybersecurity, Identity Management
-
Bob Hull
Updates
-
The DarkGate remote access Trojan (RAT) has found a sneaky new way to infiltrate systems: a cybercriminal targeted a Microsoft Teams user through a voice call to breach their device. This fresh tactic joins a lineup of other devious methods for spreading the RAT, which has previously been distributed via phishing emails, malvertising, hijacking Skype and Teams messages, and even manipulating search engine results, according to researchers.
Microsoft Teams Vishing Spreads DarkGate RAT
darkreading.com
-
The U.S. healthcare sector is undergoing a remarkable transformation, fueled by technological advancements, legislative shifts, and a growing emphasis on patient-centered care. As the healthcare landscape continues to change, organizations need to innovate while keeping patient care at the forefront. By adopting telemedicine, hospital-at-home models, value-based care, and state-of-the-art digital tools, healthcare providers can enhance access, reduce costs, and boost patient outcomes.
Council Post: Key Trends Reshaping The Future Of U.S. Healthcare
social-www.forbes.com
-
When we think about industries at high risk for data breaches, finance and healthcare usually come to mind. Yet, the education sector, which relies heavily on personal identifiable information (PII), often flies under the radar. Many people might not worry about sharing PII in exchange for services like school enrollment. However, for K-12 students, this could be an early and unfortunate encounter with the world of cybercrime and its consequences.
The Education Industry: Why Its Data Must Be Protected
darkreading.com
-
Let's explore how cybersecurity incidents can send shockwaves through business operations and customer experiences, even in sectors not typically linked with high-tech services, leading to operational chaos, financial losses, and a breakdown of customer trust.
Security experts respond to Krispy Kreme cyber attack
securitymagazine.com
-
As 2025 approaches, the CMMC deadlines are fast approaching. If you're a defense contractor handling controlled unclassified information (CUI) or federal contract information (FCI), you'll need to achieve one of three levels of CMMC compliance based on how sensitive the information is. Are you prepared?
Final rule for CMMC cybersecurity program goes into effect for defense contractors
-
Email hacking is widespread, but there are still numerous simple strategies to enhance your email security. Although it's impossible to make your email entirely hacker-proof, the way you engage with your mail app and handle your messages can help you avoid the most common hacking attempts.
As Gmail Hackers Strike—4 Ways To Protect Your Email Account
social-www.forbes.com
-
"Digital license plates, already legal to buy in a growing number of states and to drive with nationwide, offer a few perks over their sheet metal predecessors. You can change their display on the fly to frame your plate number with novelty messages, for instance, or to flag that your car has been stolen. Now one security researcher has shown how they can also be hacked to enable a less benign feature: changing a car's license plate number at will to avoid traffic tickets and tolls—or even pin them on someone else."
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets
wired.com
-
As modern software development continues to evolve, the role of CI/CD pipeline governance has become crucial in balancing agility with compliance. Now, as we step into the era of artificial intelligence (AI), the need for strong pipeline governance has grown even more pressing. Let's dive into what CI/CD pipeline governance is all about and why it’s essential, especially as AI becomes a more integral part of our software processes.
Data Governance in DevOps: Ensuring Compliance in the AI Era
thehackernews.com
-
Looking to protect yourself from cyber attacks? We've got you covered with a straightforward list! Whether you're an individual facing a cyber threat or a small business, this site offers a simple list to get you started. Craving a more comprehensive guide on handling cyber attacks? Reach out to Idenhaus, and we'll craft a customized plan for your organization, guiding you from response to recovery. Don't be caught off guard—it's time to update those security strategies!
How can you stay safe from cyber attacks? Here are 2 simple checklists from experts
theconversation.com