chart on paper with magnifying glass for post Understanding HIPAA healthcare statistics

3 min read

Understanding HIPAA healthcare statistics

The HIPAA Privacy Rule mandates security standards for HIPAA-covered entities to protect patient information and promote cybersecurity policies. Healthcare organizations must understand HIPAA violation statistics to address cybersecurity risks.

Read More
Image of someone touching a digital screen for blog post on Regulating AI in healthcare

4 min read

Regulating AI in healthcare

Artificial intelligence (AI) has quickly transformed many industries, and healthcare is no exception. Along with the benefits, there are growing...

Read More
Can HIPAA violations lead to termination?

3 min read

Can HIPAA violations lead to termination?

HIPAA violations can have serious consequences for both healthcare organizations and individual employees. The severity of a violation, along with...

Read More
How HIPAA gives patients control over health information

2 min read

How HIPAA gives patients control over health information

HIPAA gives patients greater control over health information through several provisions. These include the rights to access, consent, privacy,...

Read More
NIST takes a stand against nonsensical password rules

2 min read

NIST takes a stand against nonsensical password rules

The National Institute of Standards and Technology (NIST) is pushing to eliminate outdated password rules in a sweeping overhaul to enhance security...

Read More
Data leak exposes personal details of over 100 million Americans

1 min read

Data leak exposes personal details of over 100 million Americans

A data leak has exposed the personal and employment information of over 100 million Americans. The breach occurred due to a background check...

Read More
What is TPA in healthcare

4 min read

What is TPA in healthcare

A third-party administrator (TPA) in healthcare is an independent individual or organization responsible for managing administrative tasks for an...

Read More
What is Kerberoasting?

2 min read

What is Kerberoasting?

According to IBM, “Kerberoasting is a cyberattack that exploits the Kerberos authentication protocol. Threat actors steal Kerberos service tickets to...

Read More
Understanding HIPAA

5 min read

Understanding HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) is a piece of legislation that influences how organizations manage sensitive patient...

Read More
Cybersecurity trends and threats in healthcare

3 min read

Cybersecurity trends and threats in healthcare

The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...

Read More
FBI issues warning on surging BEC scams causing $55 billion in losses

2 min read

FBI issues warning on surging BEC scams causing $55 billion in losses

The Federal Bureau of Investigation (FBI) has warned businesses, urging them to bolster their defenses against business email compromise (BEC)...

Read More
microphone icon surrounded by other digital icons

3 min read

HIPAA compliant Voice over Internet Protocol (VoIP)

HIPAA compliant VoIP is an essential aspect of secure healthcare communication. Healthcare organizations can ensure compliance and benefit from the...

Read More
HIPAA violations & enforcement

3 min read

HIPAA violations & enforcement

Maintaining HIPAA compliance is challenging but necessary for safeguarding patient data. Knowing how enforcement works, what penalties can be...

Read More