CurrentWare Helps Companies become HIPAA Compliant

How do I become HIPAA compliant?

 

In today’s digital and mobile age, the healthcare sector is susceptible to increasing vulnerabilities of exposing confidential patient files. With the dissemination of data via the information “super highway” and mobile communication devices, the incidences of data loss through security breaches continues to be a growing risk for medical facilities.

To safe guard the privacy of patient information, the healthcare sector in the US is obliged to comply with the guidelines under the Health Insurance Portability and Accountability Act (HIPAA).

CurrentWare offers a range of solutions to help healthcare organizations address HIPAA compliance security standards.

 

 
AccessPatrol controls device access

AccessPatrol

Restrict and Audit Access to USB and Endpoint Devices

In With the influx of mobile storage devices such as USB devices and smartphones, stealing confidential patient data can be achieved quite transparently without the knowledge of authorities.

AccessPatrol provides comprehensive endpoint security to prevent theft of patient records:

  • Enforce selective data access: Implement access privileges: read only, read and write, or no access to patient data files.
  • Whitelist endpoints: Totally block access to all endpoints. Allow access to authorized endpoint devices such as USBs, using the AccessPatrol Allowed List
  • Comprehensive Reporting: Inclusive reporting ensures speedy identification of abusive use of endpoint devices.
  • Offsite Management: Endpoint security polices will be maintained, even if the computer or laptop is used outside the building.
 

 
BrowseReporter monitor Internet access

BrowseReporter

Report on Internet, Bandwidth & Application Usage

Monitor Internet usage, by tracking and reporting on the websites visited and duration of visits by the healthcare staff. Identify users that are frequently visiting sites that may compromise patient information or infect your network.

  • Real Time Monitoring: Accurate real time monitoring of Internet activity on a per employee or per computer basis. Meticulous recording of all employee Internet activity.
  • Bandwidth Tracking: Capture and instantly analyze bandwidth usage, to realize bottlenecks and detect trends of suspicious usage of bandwidth.
  • Application Tracking: Discover if malicious software are being launched on your end user's computers
  • Email Reports Automatically: Schedule reports to be automatically emailed to the managers on a daily, weekly or monthly basis.
  • Offsite Monitoring: Computers or laptops that are typically used offsite, such as in ambulances, can be assured the same level of Internet monitoring as the computers that are onsite. Monitoring of offsite systems is not compromised.
 

 
Web Filter control Internet access

BrowseControl

Block Websites and Malicious Applications

Protect against Internet threats, by blocking and filtering websites not related to the medical facility. Enforce Internet restriction policies for HIPAA compliance. Improve staff productivity and mitigate security threats to your network and healthcare data.

  • Whitelist & Blacklist Sites: Reduce Internet threats and infections by restricting access to medical related sites only, by employing the Allowed List and Blocked List feature.
  • URL Category Filtering: Choose from over 100 URL Categories to instantly block thousands of sites within a Category. Restricting access to questionable sites, reduces the risk of users frequenting malicious sites that could be hosted by hackers, waiting to penetrate a vulnerable medical practice.
  • Block Downloading of Files: Restrict users from downloading files that could inadvertently result in compromising the company network. Preventing users from downloading music and video files limits the hogging of the corporate bandwidth and reduces staff distractions.
  • Block Suspicious applications: Increase employee productivity by blocking time wasting applications such as online chats and games.
  • Offsite Filtering: Laptops used by mobile medical workers can be subject to the same Internet policies as those onsite. This mitigates the risk of Internet misuse by offsite employees as well.
 

How does CurrentWare work?

CurrentWare HIPAA Compliance Software

Let's get started!

On this page, we will show you how to install and configure CurrentWare on your Windows workstations.

Before your begin: Download the CurrentWare Setup File

Download CurrentWare's BrowseControl Web Filter

Try it now for Free. The Free trial is fully functional. You can block any websites on your employee's computers.

Please wait...

Install CurrentWare Web Filter Console on IT manager's computer

On the Manager’s computer, install the CurrentWare Console

  1. Run the setup file
  2. Select AccessPatrol, BrowseReporter, BrowseControl and Category Filtering
  3. The Installer will proceed to install the CurrentWare Server, Console and BrowseControl onto your computer
Install CurrentWare Web Filter Client on Employee's computers

On the employee’s computers, install the CurrentWare Clients

  1. Take the CurrentWare Client setup file and run it on the client computer.
  2. The installer will ask you for the computer name of the CurrentWare Console to establish a connection.
  3. After the CurrentWare Client is installed, it will connect to your CurrentWare Console automatically.
  4. Repeat step 1-3 on all the computers you want to manage.
Install CurrentWare Web Filter Console on IT manager's computer

You're all set!

Return to the Manager’s PC and launch the CurrentWare Console