Image of shield for blog about What is NIST compliance

3 min read

What is NIST compliance

The National Institute of Standards and Technology (NIST) helps organizations strengthen their cybersecurity practices. Federal agencies, contractors, and other organizations that follow NIST standards can protect sensitive data and build trust...

Read More
krispy kreme logo

2 min read

Ransomware gang claims responsibility for Krispy Kreme cyberattack

The Play ransomware gang has claimed responsibility for a cyberattack on Krispy Kreme, disrupting online ordering and raising concerns about data...

Read More
Image of blocks reading

3 min read

The 7 HIPAA compliance rules for covered entities

According to the U.S. Department of Health and Human Services (HHS), “Individuals, organizations, and agencies that meet the definition of a covered...

Read More
Image of individuals shaking hands for blog about Understanding BAA compliance in healthcare 

3 min read

Understanding BAA compliance in healthcare

Protecting sensitive patient information is a top priority in healthcare, especially as organizations work closely with third-party service...

Read More
Image of someone on a computer for blog about Phishing attack exposed data of over 1.1 million clients

2 min read

Phishing attack exposed data of over 1.1 million clients

A phishing attack on the Illinois Department of Human Services exposed the personal and public assistance data of over 1.1 million clients.

Read More
Image of two people shaking hands for blog about Is a BAA required for incidental contact with PHI? 

3 min read

Is a BAA required for incidental contact with PHI?

In healthcare, protecting patient information is mandatory, and HIPAA sets specific guidelines to ensure that protected health information (PHI)...

Read More
judge with law gavel

2 min read

Texas judge blocks Biden administration rule

A Texas judge has blocked a federal privacy rule, citing conflicts with state laws on abortion and gender care.

Read More
Image of shield for blog about Cybersecurity management lessons from healthcare data breaches

3 min read

Cybersecurity management lessons from healthcare data breaches

Cybercriminals have set their sights on the healthcare sector, and recent breaches have shown just how vulnerable this industry has become. With...

Read More
Image of warehouse for blog about Compliance in healthcare supply chain management 

3 min read

Compliance in healthcare supply chain management

In healthcare, where so much is at stake, the supply chain is fundamental for getting medications, equipment, and resources where they’re needed...

Read More
Image of gavel and money for blog about HIPAA violation fines 

3 min read

HIPAA violation fines 

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) is a concern for healthcare organizations and business associates...

Read More
Image of email icons for blog about Does the security rule allow for sending ePHI via email or the Internet? 

2 min read

Does the security rule allow for sending ePHI via email or Internet? 

The HIPAA security rule permits sending electronic protected health information (ePHI) via email or the Internet, provided safeguards are in place to...

Read More
phone with stethoscope

3 min read

What information can hospitals give over the phone?

As healthcare providers, patients, and families understand the complexities of hospital communication, a common question arises: what information can...

Read More
digital IP address icons

4 min read

What is DNS cache poisoning?

The domain name system (DNS) translates human-readable domain names into machine-readable IP addresses. However, this system is not immune to...

Read More