Security & Compliance
The Highest Data Security Standards in the Industry
CaseWorthy is a leader in data security, hosting, deployments, and policy development. Our platforms offer high system availability and security-focused environments which are monitored 24/7/365 by our dedicated internal information security team. CaseWorthy’s clients also routinely collaborate with our separate internal Compliance team on the latest regulatory requirements and guidance, to promote consistent compliance and industry expertise.
- HIPAA Compliant
- HITECH Compliant
- NIST 800-53 Compliant
- SOC2 Type 2 Compliant
- LIHEAP and HMIS Compliant (CaseWorthy Solution)
Encryption
Encrypted using industry standards. Secure FTP and 2048-bit SSL used between Web and SQL Servers behind firewalls and load balancers.
High Availability
Servers are located within East Coast Availability Zones – all services are redundant (in mirrored environments).
Access Control
Role-based access controls through the applications ensures the user can permit or restrict access as needed to meet your specific business needs.
Network Security
Role-based security, ACLs, firewalls, filtering through web app firewalls, and network restriction via VPCs/VNets.
Security, Incident & Event Monitoring
Network traffic and updated threat intelligence leveraged 24x7x365 to monitor network traffic for threat actors.
Penetration Testing
Annual penetration testing conducted by trusted third parties to ensure applications and data are secure.
Secure Remote Access
No public-facing access; all ingress points via VPN or Load Balancer that are constantly monitored.
Vulnerability Scanning
Infrastructure and web-facing scans are conducted regularly. SIEM also does monthly scans of all public internet facing IP addresses and FQDNS.
Data Backup
Data is copied to multiple availability zones for redundancy.
Compliance
Up to date on the latest regulatory requirements and guidance (including HITRUST for Connect by CaseWorthy); applications hosted in SOC1/SOC2 certified environments.
Performance Monitoring
Server performance (CPU, drive space, memory utilization) and security event monitoring and alerts.
Scalability
Instances in hardened virtual cloud environments (AWS or Azure) for enhanced scalability.
Related Information:
How to Surf the Internet Safely Without Losing Your Sanity (or Your Data)
Learn how to stay safe online with practical tips on choosing secure websites, using strong…
Mobile Device Security and Social Media: How to Not Get Hacked
Learn about the cybersecurity risks of using mobile phones for social media, public Wi-Fi, and…
Cybersecurity Essentials: A Guide for Everyone
Join CaseWorthy for a special webinar in celebration of Cybersecurity Awareness Month! With cybercrime on…
Understanding Phishing: A Persistent Cyber Threat
In this article, we highlight phishing as a persistent and evolving cyber threat, with attackers…
Cybersecurity Fundamentals and the User’s Role
Cybersecurity is a shared responsibility in human services, where sensitive data like health records and…
MediSked, a CaseWorthy Company, Achieves HITRUST Implemented, 1-year (i1) Certification to Manage Data Protection and Mitigate Cybersecurity Threats
MediSked, a CaseWorthy Company, a leading provider of software solutions for the health and human…
Ready to Get Started?
Learn why health and human service organizations thrive with CaseWorthy. Our expert team is ready to consult with you on the unique needs of your organization.
We gained a lot more than a basic case management system. Our Community selected CaseWorthy for its user-friendly interface, secure data platform, and affordable cost. The baseline CaseWorthy product is fully “built out” with hundreds of features and capabilities.
Director of Fragile Families Initiative, Community Council of St. Charles County