CISA unveils new reporting portal for threat response 

2 min read

CISA unveils new reporting portal for threat response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are reported.

Read More
CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

2 min read

CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

A faulty software update from cybersecurity firm CrowdStrike is under scrutiny as the company prepares to testify before Congress. Lawmakers try to...

Read More
What is a database?

4 min read

What is a database?

A database is an organized collection of structured information or data stored electronically in a computer system. It is usually controlled by a...

Read More
What is a business associate agreement?

3 min read

What is a business associate agreement?

A business associate agreement (BAA) is a legally binding contract establishing a relationship between a covered entity under the Health Insurance...

Read More
The purpose of duty to warn in therapy

3 min read

The purpose of duty to warn in therapy

While therapy is built on a foundation of trust and confidentiality, therapists must sometimes disclose information in the interest of public safety....

Read More
EDI in healthcare

4 min read

EDI in healthcare

Electronic data interchange (EDI) has recently impacted how healthcare organizations manage and share information. The technology enables the secure...

Read More
Adopted standards and operating rules from the CMS

3 min read

Adopted standards and operating rules from the CMS

According to the Centers for Medicare and Medicaid Services, “HIPAA required HHS to establish national standards for electronic transactions to...

Read More
What is the Emergency Medical Treatment and Labor Act (EMTALA)?

3 min read

What is the Emergency Medical Treatment and Labor Act (EMTALA)?

The healthcare industry in the United States has transformed over the years, focusing on ensuring equitable access to emergency medical care...

Read More
Cyber fire drills for healthcare cybersecurity

3 min read

Cyber fire drills for healthcare cybersecurity

Despite cybersecurity policies and employee training programs, healthcare organizations frequently fall victim to cyberattacks. Organizations must...

Read More
What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher...

Read More
HHS-OIG: Improving cloud security controls 

3 min read

HHS-OIG: Improving cloud security controls

Cloud computing is now a fundamental aspect of modern business operations, making the security and protection of cloud-based systems more necessary...

Read More
Security camera vendor fined $2.95M for data security violations

3 min read

Security camera vendor fined $2.95M for data security violations

The Federal Trade Commission (FTC) has imposed a $2.95 million fine on the California-based security camera provider Verkada. The penalty resolves...

Read More
The cost of security breaches

3 min read

The cost of security breaches

To avoid security breaches' financial and reputational risks, companies must focus on prevention, hire skilled personnel, and use advanced security...

Read More