marijuana plant with stethoscope

3 min read

Do medical marijuana companies need to comply with HIPAA?

As the U.S. government considers reclassifying cannabis from a Schedule I to a Schedule III substance, the conversation around patient privacy and data protection in the cannabis industry is more relevant than ever.

Read More
Image of locks for blog about What is deception technology?

3 min read

What is deception technology?

Deception technology is an innovative strategy for preventing cyberattacks. It involves creating a realistic decoy environment to divert...

Read More
Image of shield for blog about What is XDR? 

3 min read

What is XDR?

As cyber threats grow more sophisticated, organizations are turning to advanced tools to protect sensitive data and maintain seamless operations....

Read More
Image of shield for blog about Types and consequences of HIPAA violations

4 min read

Types and consequences of HIPAA violations

Healthcare professionals frequently ask about how HIPAA violations can vary and how they may impact a professional or practice. The answer depends on...

Read More
Image of someone on a computer for blog about Anna Jaques Hospital ransomware attack exposed over 300,000 patient records

1 min read

Anna Jaques Hospital ransomware attack exposes patient records

Hackers leak over 300,000 patient records in Anna Jaques Hospital ransomware attack.

Read More
Image of someone looking at analytics for blog about How healthcare analytics is changing patient care

4 min read

How healthcare analytics is changing patient care

Healthcare analytics is making a real difference in patient care. Instead of focusing on how much care is provided, it’s now about improving results...

Read More
romanian flag with tear

2 min read

Romania's election systems targeted in over 85,000 cyberattacks

Romania faces election turmoil after over 85,000 cyberattacks and a TikTok disinformation campaign linked to Russia disrupted presidential voting.

Read More
Image of lcok for blog about The importance of secure healthcare information management

3 min read

The importance of secure healthcare information management

With over 328 million terabytes of data generated daily, cyber threats are rising as criminals seek to exploit this valuable resource. Today, secure...

Read More
Image of thumbs pointing up or down for blog about Social media HIPAA violation series: Infant photo

2 min read

Social media HIPAA violation series: Infant photo

A photo of a baby shared online by a MUSC Health employee without parental consent illustrated ongoing issues with HIPAA compliance and social media...

Read More
Image of someone on a computer for blog about Single email breach exposes sensitive data of 11,000 minors

1 min read

Single email breach exposes sensitive data of 11,000 minors

A phishing attack on Datavant exposed the sensitive data of over 11,000 minors, revealing the impact of a single compromised email account.

Read More
Image of stars for blog about Social media HIPAA violation series: Online reviews

2 min read

Social media HIPAA violation series: Online reviews

A New Jersey psychiatric practice faced a $30,000 settlement after disclosing patient information in responses to online reviews.

Read More
hacker at computer with digital code and russian flag

3 min read

Why Russia is often linked to ransomware cases

Russia frequently appears in discussions about cyber attacks, and for good reason. The country’s geopolitical climate, legal policies, and thriving...

Read More
Image of shield for blog about 8 lessons from the Change Healthcare ransomware attack

3 min read

8 lessons from the Change Healthcare ransomware attack

The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group (UHG), has shown the vulnerabilities in healthcare...

Read More