
2 min read
Social media HIPAA violation series: Infant photo
A photo of a baby shared online by a MUSC Health employee without parental consent illustrated ongoing issues with HIPAA compliance and social media misuse.
Read More2 min read
A photo of a baby shared online by a MUSC Health employee without parental consent illustrated ongoing issues with HIPAA compliance and social media misuse.
Read More1 min read
A phishing attack on Datavant exposed the sensitive data of over 11,000 minors, revealing the impact of a single compromised email account.
2 min read
A New Jersey psychiatric practice faced a $30,000 settlement after disclosing patient information in responses to online reviews.
3 min read
Russia frequently appears in discussions about cyber attacks, and for good reason. The country’s geopolitical climate, legal policies, and thriving...
3 min read
The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group (UHG), has shown the vulnerabilities in healthcare...
2 min read
A new phishing campaign uses corrupted Word documents to evade detection and steal credentials.
2 min read
A new HIPAA attestation form was introduced to bolster privacy protections for reproductive health care data.
5 min read
Healthcare has seen a big rise in data breaches over the past few years, and it's becoming a concern for security professionals and organizations....
2 min read
Generative AI presents a dual challenge: introducing security risks while enhancing defenses with faster threat detection and response.
2 min read
Russian authorities arrest a high-profile ransomware suspect wanted by the FBI, spotlighting international tensions over cybercrime enforcement.
2 min read
A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...
3 min read
End-of-life care conversations are important yet sensitive, allowing patients and their families to make informed decisions during difficult times....
2 min read
Russian hackers used a ‘nearest-neighbor attack’ through WiFi to breach a US company, trying to infiltrate Ukraine-related projects.