3 min read

2 min read
Cisco investigates potential data breach after hacker claims attack
Cisco is investigating reports of a potential data breach, with sensitive information allegedly being put up for sale on a well-known hacking forum.

3 min read
How HIPAA defines confidentiality, integrity, and availability of ePHI
HIPAA defines confidentiality as the protection of patient data from unauthorized disclosure. Integrity involves safeguarding data accuracy and...

3 min read
Does HIPAA apply to spouses?
According to the HHS, there are certain situations when providers may share health information with spouses. Providers must understand HIPAA and use...

2 min read
Over 200 malicious apps on Google Play downloaded millions of times
Recent reports have uncovered a surge of malicious apps on Google Play, the official Android app store. More than 200 harmful apps have been...

4 min read
What is fileless malware
Fileless malware is malicious code that uses a company’s memory instead of the hard drive. It uses legitimate programs to compromise a computer...

5 min read
What is malware & how to stay protected
Malware is the colloquial term for malicious software and refers to any software intentionally designed to cause damage to a computer, server,...

3 min read
The benefits of hospital training software
At least 40% of hospitals are not utilizing a learning management system to enhance their training efforts. A lack of structured training programs...

4 min read
Creating secure online forms
As people provide sensitive information through various web platforms, it’s up to businesses and organizations to keep this data secure. Whether it's...

3 min read
HIPAA compliant credit card processing
HIPAA, as a regulatory framework, imposes strict compliance standards on entities that handle health records. However, credit cards are exempted on...

4 min read
What are the penalties for breaching HIPAA?
Breaching HIPAA regulations can lead to severe financial penalties, criminal charges, and reputational damage. The penalties for HIPAA breaches...

4 min read
What are living off the land (LOTL) attacks
According to Crowdstrike, “Living off the land (LOTL) is a fileless malware or LOLbins cyberattack technique where the cybercriminal uses native,...

5 min read
Regulations on AI for healthcare workers and nurses
The regulation of AI in healthcare, particularly related to the roles of healthcare workers and nurses, is a complex and changing field. As AI...