Image of someone on their phone for blog about Is iMessage right for healthcare communication? Here's what you need to know

2 min read

Is iMessage safe for healthcare communication

Healthcare providers face a constant challenge: finding ways to connect with clients while following complex regulations. Apple’s iMessage has become increasingly popular, but this tool is not a strong option for organizations needing to comply with...

Read More
Image of lock for blog about How DNSSEC works and why it matters

2 min read

How DNSSEC works and why it matters

The Domain Name System (DNS) acts like the internet’s address book, translating domain names into IP addresses. Traditional DNS has no built-in...

Read More
smartphone sitting on world map

3 min read

Exploring how HIPAA affects new communication technologies

New communication tools are changing healthcare but bring risks if patient privacy isn’t protected. Providers must ensure these technologies align...

Read More
Image of federal office building for blog about Chinese hackers target U.S. Treasury Department

2 min read

Chinese hackers target U.S. Treasury Department

State-sponsored Chinese hackers breach U.S. Treasury systems, exposing vulnerabilities in government cybersecurity.

Read More
Image of money for blog about Top 5 cybersecurity lessons from the largest HIPAA settlements 

2 min read

Top 5 cybersecurity lessons from the largest HIPAA settlements

Massive HIPAA settlements reveal common missteps in healthcare cybersecurity and offer valuable lessons for protecting sensitive patient data.

Read More
Image of someone at a computer for blog about What is fake hacking, and why should you care?

2 min read

What is fake hacking and why should you care?

Fake hacking is when someone pretends to hack your computer or system to scare you. It’s not the same as real hacking, where someone breaks into your...

Read More
Image of candle for blog about Does HIPAA end when life does?

3 min read

Does HIPAA end when life does?

Many assume privacy concerns end with death, but HIPAA protections continue to apply. The confidentiality of medical records remains important for...

Read More
Image of shield for blog about What is NIST compliance

3 min read

What is NIST compliance

The National Institute of Standards and Technology (NIST) helps organizations strengthen their cybersecurity practices. Federal agencies,...

Read More
krispy kreme logo

2 min read

Ransomware gang claims responsibility for Krispy Kreme cyberattack

The Play ransomware gang has claimed responsibility for a cyberattack on Krispy Kreme, disrupting online ordering and raising concerns about data...

Read More
Image of blocks reading

3 min read

The 7 HIPAA compliance rules for covered entities

According to the U.S. Department of Health and Human Services (HHS), “Individuals, organizations, and agencies that meet the definition of a covered...

Read More
Image of individuals shaking hands for blog about Understanding BAA compliance in healthcare 

3 min read

Understanding BAA compliance in healthcare

Protecting sensitive patient information is a top priority in healthcare, especially as organizations work closely with third-party service...

Read More
Image of someone on a computer for blog about Phishing attack exposed data of over 1.1 million clients

2 min read

Phishing attack exposed data of over 1.1 million clients

A phishing attack on the Illinois Department of Human Services exposed the personal and public assistance data of over 1.1 million clients.

Read More
Image of two people shaking hands for blog about Is a BAA required for incidental contact with PHI? 

3 min read

Is a BAA required for incidental contact with PHI?

In healthcare, protecting patient information is mandatory, and HIPAA sets specific guidelines to ensure that protected health information (PHI)...

Read More