judge with law gavel

2 min read

Texas judge blocks Biden administration rule

A Texas judge has blocked a federal privacy rule, citing conflicts with state laws on abortion and gender care.

Read More
Image of shield for blog about Cybersecurity management lessons from healthcare data breaches

3 min read

Cybersecurity management lessons from healthcare data breaches

Cybercriminals have set their sights on the healthcare sector, and recent breaches have shown just how vulnerable this industry has become. With...

Read More
Image of warehouse for blog about Compliance in healthcare supply chain management 

3 min read

Compliance in healthcare supply chain management

In healthcare, where so much is at stake, the supply chain is fundamental for getting medications, equipment, and resources where they’re needed...

Read More
Image of gavel and money for blog about HIPAA violation fines 

3 min read

HIPAA violation fines 

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) is a concern for healthcare organizations and business associates...

Read More
Image of email icons for blog about Does the security rule allow for sending ePHI via email or the Internet? 

2 min read

Does the security rule allow for sending ePHI via email or Internet? 

The HIPAA security rule permits sending electronic protected health information (ePHI) via email or the Internet, provided safeguards are in place to...

Read More
phone with stethoscope

3 min read

What information can hospitals give over the phone?

As healthcare providers, patients, and families understand the complexities of hospital communication, a common question arises: what information can...

Read More
digital IP address icons

4 min read

What is DNS cache poisoning?

The domain name system (DNS) translates human-readable domain names into machine-readable IP addresses. However, this system is not immune to...

Read More
Image of computer for blog about HIPAA compliant computer disposal 

3 min read

HIPAA compliant computer disposal

The HIPAA privacy rule requires healthcare entities to create and follow policies for safely disposing of protected health information (PHI),...

Read More
Image of someone holding tickets for blog about What is a golden ticket attack?

3 min read

What is a golden ticket attack?

Golden ticket attacks are when criminals infiltrate the Kerberos authentication system. They are a serious cybersecurity threat, especially for...

Read More
Meta logo

2 min read

Meta fined €251 million for GDPR violations

Meta was fined €251 million for failing General Data Protection Regulation (GDPR) requirements in a Facebook data breach affecting 29 million...

Read More
Image of key for blog about Why covered entities should use encryption–even if it isn’t required

2 min read

Why covered entities should use encryption–even if it isn’t required

In healthcare, protecting patient information is a top priority. Many people think HIPAA requires encryption for electronic protected health...

Read More
security lock on hospital graphic

2 min read

PIH Health ransomware breach exposes 17M records

Hackers claim to have exfiltrated 17 million patient records in a ransomware attack on PIH Health.

Read More