data chip for post What are living off the land (LOTL) attacks

4 min read

What are living off the land (LOTL) attacks

According to Crowdstrike, “Living off the land (LOTL) is a fileless malware or LOLbins cyberattack technique where the cybercriminal uses native, legitimate tools within the victim’s system to sustain and advance an attack.” Unlike conventional...

Read More
healthcare worker touching AI digital icon for post Regulations on AI for healthcare workers and nurses

5 min read

Regulations on AI for healthcare workers and nurses

The regulation of AI in healthcare, particularly related to the roles of healthcare workers and nurses, is a complex and changing field. As AI...

Read More
Image of person in a hoody at a computer for blog about MoneyGram faces data breach with worldwide impact

2 min read

MoneyGram faces data breach with worldwide impact

MoneyGram, a money transfer company, has experienced a cyber attack that led to a data breach affecting many customers worldwide. The incident began...

Read More
star health logo for post Star Health CISO accused of selling 31 million customers data to hacker

2 min read

Star Health CISO accused of selling 31 million customers data to hacker

Star Health Insurance, a health insurance provider in India, is facing a data breach controversy. A hacker named xenZen claims that a senior...

Read More
Image of a pice of paper that says

3 min read

What is the FTC’s revised health breach notification rule? 

To address the issue of the protection of consumer health data, the Federal Trade Commission (FTC) has implemented changes to the health breach...

Read More
Image of papers for article about Understanding HIPAA transactions and code set rules

3 min read

Understanding HIPAA transactions and code set rules

Code sets and transactions are standardized codes used for data elements in healthcare. These codes can simplify the exchange of information and lead...

Read More
Image of individual with a phone for blog about CMS rules for HIPAA compliance when texting patient data

3 min read

CMS rules for HIPAA compliance when texting patient data

As healthcare professionals increasingly rely on mobile technology for patient care, HIPAA compliance has become a growing concern. The Centers for...

Read More
Image of heart rate monitoring for blog about understanding health monitoring systems

3 min read

Understanding health monitoring systems

A health monitoring system is a technology-based solution enabling the remote monitoring of a patient's health. It encompasses many devices, sensors,...

Read More
Image of person in a hoodie with email icons for a blog about survey reveals ransomware attacks are becoming the norm

2 min read

Survey reveals ransomware attacks are becoming the norm

A recent survey revealed that 67% of healthcare organizations have faced ransomware attacks in the past year. Cyber threat groups are targeting...

Read More
HIMSS logo for post HIMSS healthcare cybersecurity survey

5 min read

HIMSS healthcare cybersecurity survey

The Healthcare Information and Management Systems Society (HIMSS) conducted its annual healthcare cybersecurity survey, showing the current state of...

Read More
Image of individual on a computer for blog about Learning from the CMS data breach 

3 min read

Learning from the CMS data breach 

A recent investigation has revealed that the data breach at Wisconsin Physicians Service (WPS) and the Centers for Medicare & Medicaid Services (CMS)...

Read More
Image of voice waves for blog about HIPAA compliant VoIP services

4 min read

HIPAA compliant VoIP services

HIPAA compliant Voice over Internet Protocol (VoIP) systems are designed to store and transmit PHI while mitigating data privacy and security risks....

Read More
meta logo for post Meta hit with €91 million fine for lax password safety

2 min read

Meta hit with €91 million fine for lax password safety

The General Data Protection Regulation (GDPR) has given a hefty €91 million fine to Meta, the parent company of social media giants Facebook and...

Read More