Galen Data, Inc., a leading provider of medical device cloud data storage, today announced the Galen Cloud hosted on Amazon Web Services has earned Certified status for information security by HITRUST.
The frequency and sophistication of cyber-attacks is increasing at an alarming rate. The healthcare industry is no exception as hackers attempt to breach systems to access patient data that can be sold or otherwise monetized. The impact of these attacks is calculated in the billions of dollars. Combating these threats is crucial to patient protection, regulatory compliance, and organizational survival.
Also Read: Addressing SaaS Security Challenges with Comprehensive SaaS Management
HITRUST Risk-based, 2-year (r2) Certified status demonstrates that the organization’s Galen Cloud hosted on Amazon Web Services has met key regulations and industry-defined requirements and is appropriately managing risk. This achievement places Galen Data in an elite group of organizations worldwide that have earned this certification. By including federal and state regulations, standards, and frameworks, and incorporating a risk-based approach, the HITRUST Assurance Program helps organizations address security and data protection challenges through a comprehensive and flexible framework of prescriptive and scalable security controls.
“The rigorous work that goes into obtaining this significant certification through HITRUST, cannot be overstated,” said Chris DuPont, CEO of Galen Data. “We take our responsibility to our customers very seriously and aim for the highest standards as it relates to safety and security. We want any medical device company — big or small — to be fully confident in leveraging the Galen CloudTM for their medical device.”
“In today’s ever-changing threat landscape, HITRUST is continually innovating to find new and creative approaches to address challenges,” said Jeremy Huval, Chief Innovation Officer, HITRUST. “Galen Data’s HITRUST Risk-based, 2-year Certification is evidence that they are at the forefront of industry best practices for information risk management and compliance.”
For more such updates follow us on Google News ITsecuritywire News