docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More
blue digital lock for post October OCR cybersecurity newsletter warns of social engineering attacks

2 min read

October OCR cybersecurity newsletter warns of social engineering attacks

The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...

Read More
lawyer with office paperwork for post What is a HIPAA power of attorney?

4 min read

What is a HIPAA power of attorney?

Understanding healthcare decisions and ensuring patient privacy can be overwhelming, especially when someone isn’t able to make decisions on their...

Read More
digital lock on computer for post What is threat hunting?

4 min read

What is threat hunting?

According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...

Read More
computer screen with multiple people on a video call for post Meeting HIPAA requirements while working remotely

3 min read

Meeting HIPAA requirements while working remotely

The Department of Health and Human Services (HHS) explains, “Telework has immediate and long-term benefits for healthcare organizations but security...

Read More
encryption key red for post New tool bypasses Google Chrome’s new cookie encryption system

2 min read

New tool bypasses Google Chrome’s new cookie encryption system

A new tool has been released that can bypass Google Chrome’s latest cookie encryption, sparking concerns over the security of user data stored in the...

Read More
Image of megaphone and phone for blog about HIPAA marketing rules private practices need to know

4 min read

HIPAA marketing rules private practices need to know

Private practices must understand HIPAA marketing requirements to successfully create campaigns that pull in patients while keeping their protected...

Read More
Image of servers with cloud in the middle for blog about HIPAA compliant servers

4 min read

HIPAA compliant servers

Healthcare organizations generate and store vast amounts of sensitive data however protecting that information isn’t just about following the...

Read More
Image of a shield for blog about What is a HIPAA compliance plan?

4 min read

What is a HIPAA compliance plan?

A HIPAA compliance plan is a detailed, tailored strategy that enables healthcare organizations to respond swiftly and effectively to incidents,...

Read More
Image of lines that symbolize a network for blog about Benefits of digitalization in healthcare

5 min read

Benefits of digitalization in healthcare

The digitalization of healthcare has transformed how health services are how the healthcare system operates. Many practices rely on digitalized...

Read More
blue digital lock for post Healthcare data protection strategies

3 min read

Healthcare data protection strategies

Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...

Read More
digital lock for post Top cybersecurity focus areas revealed at HHS and NIST conference

2 min read

Top cybersecurity focus areas revealed at HHS and NIST conference

The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...

Read More
Image of lock for blog about Best practices for secure data management

3 min read

Best practices for secure data management

With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...

Read More