Image of individual with a phone for blog about CMS rules for HIPAA compliance when texting patient data

3 min read

CMS rules for HIPAA compliance when texting patient data

As healthcare professionals increasingly rely on mobile technology for patient care, HIPAA compliance has become a growing concern. The Centers for Medicare & Medicaid Services (CMS) has clarified the rules surrounding text messaging and sharing...

Read More
Image of heart rate monitoring for blog about understanding health monitoring systems

3 min read

Understanding health monitoring systems

A health monitoring system is a technology-based solution enabling the remote monitoring of a patient's health. It encompasses many devices, sensors,...

Read More
Image of person in a hoodie with email icons for a blog about survey reveals ransomware attacks are becoming the norm

2 min read

Survey reveals ransomware attacks are becoming the norm

A recent survey revealed that 67% of healthcare organizations have faced ransomware attacks in the past year. Cyber threat groups are targeting...

Read More
HIMSS logo for post HIMSS healthcare cybersecurity survey

5 min read

HIMSS healthcare cybersecurity survey

The Healthcare Information and Management Systems Society (HIMSS) conducted its annual healthcare cybersecurity survey, showing the current state of...

Read More
Image of individual on a computer for blog about Learning from the CMS data breach 

3 min read

Learning from the CMS data breach 

A recent investigation has revealed that the data breach at Wisconsin Physicians Service (WPS) and the Centers for Medicare & Medicaid Services (CMS)...

Read More
Image of voice waves for blog about HIPAA compliant VoIP services

4 min read

HIPAA compliant VoIP services

HIPAA compliant Voice over Internet Protocol (VoIP) systems are designed to store and transmit PHI while mitigating data privacy and security risks....

Read More
meta logo for post Meta hit with €91 million fine for lax password safety

2 min read

Meta hit with €91 million fine for lax password safety

The General Data Protection Regulation (GDPR) has given a hefty €91 million fine to Meta, the parent company of social media giants Facebook and...

Read More
Image of lock on keyboard for aticle about what is a pass-the-hash attack?

3 min read

What is a pass-the-hash attack?

According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it...

Read More
law gavel in front of books with a stethescope

3 min read

Can a patient sue for a HIPAA violation?

HIPAA does not allow patients to sue for violations. However, under state laws, healthcare providers can be sued. Patients can file complaints with...

Read More
chart on paper with magnifying glass for post Understanding HIPAA healthcare statistics

3 min read

Understanding HIPAA healthcare statistics

The HIPAA Privacy Rule mandates security standards for HIPAA-covered entities to protect patient information and promote cybersecurity policies....

Read More
Image of someone touching a digital screen for blog post on Regulating AI in healthcare

4 min read

Regulating AI in healthcare

Artificial intelligence (AI) has quickly transformed many industries, and healthcare is no exception. Along with the benefits, there are growing...

Read More
Can HIPAA violations lead to termination?

3 min read

Can HIPAA violations lead to termination?

HIPAA violations can have serious consequences for both healthcare organizations and individual employees. The severity of a violation, along with...

Read More
How HIPAA gives patients control over health information

2 min read

How HIPAA gives patients control over health information

HIPAA gives patients greater control over health information through several provisions. These include the rights to access, consent, privacy,...

Read More