Answer:
The question is explained in detailed way in explanation section and in attached files.
Step-by-step explanation:
The HIPAA Security Rule is designed to be flexible and appropriate for our organization’s particular size, structure, and inherent risks to business and personal information. Risk analysis is meant to be an ongoing process, during which we regularly review our records to track access to business and personal systems and data. With this in mind, I recommend that we expand our information security strategy to include more than just what is required in HIPAA. Just as a reminder below is the HIPAA ecompliance and implementation strategy that we came up with last week as given in attached file 1.
There are several areas in IT security that the above is incomplete or insufficient in. We recommend implementing several more complete or alternative controls in order to protect our systems, patients, employees, contractors, vendors, and assets beyond the HIPAA minimum requirements. The below section describes what the Centers for Medicare and Medicaid Services (CMS) recommend as additional areas to focus on in the effort to increase an organization's security. (See the attached file # example of some of the areas that we should monitor beyond what HIPAA requires are given in attached file # 03.