Wisconsin county scrutinized after 11-month breach notification delay

2 min read

Wisconsin county scrutinized after 11-month breach notification delay

After discovering a cybersecurity breach on October 4, 2023, Richland County, Wisconsin, only sent letters notifying affected residents in August. Several residents took to Facebook, questioning the county's response plan and demanding more...

Read More
A guide to reporting HIPAA violations

2 min read

A guide to reporting HIPAA violations

Anyone who suspects a HIPAA violation by a healthcare provider, an insurance company, or another covered entity, must report the violation to the...

Read More
182,670 patients affected by Illinois Bone & Joint Institute breach

2 min read

182,670 patients affected by Illinois Bone & Joint Institute breach

Illinois Bone & Joint Institute (IBJI) recently disclosed that a network security breach exposed the protected health information (PHI) of 182,670...

Read More
How the NIST Cybersecurity Framework relates to HIPAA compliance

3 min read

How the NIST Cybersecurity Framework relates to HIPAA compliance

Recently, healthcare providers and health plans have been major targets of cyberattacks, causing the impermissible disclosure of protected health...

Read More
A comprehensive list of federal agencies that must be HIPAA compliant

5 min read

A comprehensive list of federal agencies that must be HIPAA compliant

HIPAA compliance is often discussed in the context of covered entities like healthcare providers and insurance companies but many federal agencies...

Read More
How a phishing scam took over my phone and how I recovered

3 min read

How a phishing scam took over my phone and how I recovered

On September 6, 2024, I received what seemed to be a routine text message about a delivery I was expecting.The message, supposedly from The Courier...

Read More
Protecting patient privacy in the opioid crisis

2 min read

Protecting patient privacy in the opioid crisis

Addressing the opioid crisis while staying HIPAA compliant is a delicate balance, but it’s one that healthcare providers must master if we’re ever...

Read More
What is cybersquatting?

2 min read

What is cybersquatting?

Cybersquatters buy or register domain names that are identical or confusingly similar to trademarks, business names, or personal names. They usually...

Read More
Why encrypted email is a must in remote work settings

2 min read

Why encrypted email is a must in remote work settings

With so many healthcare professionals working from home, protecting patient information has become even more challenging. Since email is the most...

Read More
FBI warns cryptocurrency firms of North Korean social engineering attacks

2 min read

FBI warns cryptocurrency firms of North Korean social engineering attacks

On September 03, 2024, the FBI warned cryptocurrency companies about North Korean hackers using social engineering techniques to steal their digital...

Read More
Researcher sued for sharing data leaked in Columbus ransomware attack

2 min read

Researcher sued for sharing data leaked in Columbus ransomware attack

The City of Columbus, Ohio, has filed a lawsuit against cybersecurity researcher David Leroy Ross, also known as Connor Goodwolf. The lawsuit accuses...

Read More
BlackSuit targets Young Consulting exposing 954,000 individuals

2 min read

BlackSuit targets Young Consulting exposing 954,000 individuals

Atlanta-based software company Young Consulting recently reported that an attacker from the ransomware organization ‘BlackSuit’ stole 954,177...

Read More
How the Maryland Online Data Privacy Act (MODPA) will impact providers

3 min read

How the Maryland Online Data Privacy Act (MODPA) will impact providers

MODPA introduces stricter standards and broader definitions that will impact how businesses and healthcare organizations collect, process, and...

Read More