Image of computer for blog about HIPAA compliant computer disposal 

3 min read

HIPAA compliant computer disposal

The HIPAA privacy rule requires healthcare entities to create and follow policies for safely disposing of protected health information (PHI), including ePHI on electronic devices. Proper HIPAA compliant computer disposal involves fully erasing ePHI...

Read More
Image of someone holding tickets for blog about What is a golden ticket attack?

3 min read

What is a golden ticket attack?

Golden ticket attacks are when criminals infiltrate the Kerberos authentication system. They are a serious cybersecurity threat, especially for...

Read More
Meta logo

2 min read

Meta fined €251 million for GDPR violations

Meta was fined €251 million for failing General Data Protection Regulation (GDPR) requirements in a Facebook data breach affecting 29 million...

Read More
Image of key for blog about Why covered entities should use encryption–even if it isn’t required

2 min read

Why covered entities should use encryption–even if it isn’t required

In healthcare, protecting patient information is a top priority. Many people think HIPAA requires encryption for electronic protected health...

Read More
security lock on hospital graphic

2 min read

PIH Health ransomware breach exposes 17M records

Hackers claim to have exfiltrated 17 million patient records in a ransomware attack on PIH Health.

Read More
Image of smart watch for blog about HIPAA compliance with tracking technologies

4 min read

HIPAA compliance with tracking technologies

The Health Insurance Portability and Accountability Act (HIPAA) sets strict guidelines to protect patient information, including how tracking...

Read More
marijuana plant with stethoscope

3 min read

Do medical marijuana companies need to comply with HIPAA?

As the U.S. government considers reclassifying cannabis from a Schedule I to a Schedule III substance, the conversation around patient privacy and...

Read More
Image of locks for blog about What is deception technology?

3 min read

What is deception technology?

Deception technology is an innovative strategy for preventing cyberattacks. It involves creating a realistic decoy environment to divert...

Read More
Image of shield for blog about What is XDR? 

3 min read

What is XDR?

As cyber threats grow more sophisticated, organizations are turning to advanced tools to protect sensitive data and maintain seamless operations....

Read More
Image of shield for blog about Types and consequences of HIPAA violations

4 min read

Types and consequences of HIPAA violations

Healthcare professionals frequently ask about how HIPAA violations can vary and how they may impact a professional or practice. The answer depends on...

Read More
Image of someone on a computer for blog about Anna Jaques Hospital ransomware attack exposed over 300,000 patient records

1 min read

Anna Jaques Hospital ransomware attack exposes patient records

Hackers leak over 300,000 patient records in Anna Jaques Hospital ransomware attack.

Read More
Image of someone looking at analytics for blog about How healthcare analytics is changing patient care

4 min read

How healthcare analytics is changing patient care

Healthcare analytics is making a real difference in patient care. Instead of focusing on how much care is provided, it’s now about improving results...

Read More