222 W. Ontario St., Ste 230, Chicago, IL 60654
312.386.7860
312.268.7485

IT Security Assessment

We Locate IT Security Vulnerabilities

In today’s highly connected and integrated world of business, security is a main concern. From government entities to major retailers to healthcare providers, many have been victims of data breach. Our comprehensive Security Assessment identifies vulnerabilities in your system to comply with HIPAA requirements. Our HIPAA audit focuses on assessing what safeguards your system has already, identifying what policies or documentation are missing, and recommending solutions to resolve issues.

Business people meeting to discuss the situation on the market

ALIS IT Security Audit focuses on:

  • Physical safeguards
  • Technical safeguards
  • Disaster recovery and data backup plan
  • Network security
  • Computer usage
  • Review security policies
  • Password policies
  • Secure email and encryption
  • Logging and monitoring
  • PCI compliance
  • Penetration testing
  • Logging and auditing
  • Detailed documentation
  • Identify gaps
  • Recommend solutions
  • Assist in implementing solutions
  • Identify software with PHI
  • Identify BA’s
  • Review IT policies
  • Email phishing
  • Breach notification policy

“ALIS Healthcare IT helped improve the efficiency of our healthcare systems.”

— Client, Regent Surgical Health

Large organizations can spend millions of dollars to protect their data and resources and still are not able to guarantee one hundred percent that their assets are protected. Data breaches can be caused by factors such as data gaps in their network, employee web browsing, or network connectivity with outside vendors.

ALIS-WebInfoGraphic-01

ALIS-WebInfoGraphic-02

A data breach can cause deep impact to businesses, no matter the size. When a data breach happens, many patrons loose confidence in the business which causes loss of productivity, revenue, and add audit cost.

Are you prepared for a  
potential Phase 2 Audit?