What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher is an encryption process ensuring that even if the ciphertext falls into the wrong hands, the...

Read More
HHS-OIG: Improving cloud security controls 

3 min read

HHS-OIG: Improving cloud security controls

Cloud computing is now a fundamental aspect of modern business operations, making the security and protection of cloud-based systems more necessary...

Read More
Security camera vendor fined $2.95M for data security violations

3 min read

Security camera vendor fined $2.95M for data security violations

The Federal Trade Commission (FTC) has imposed a $2.95 million fine on the California-based security camera provider Verkada. The penalty resolves...

Read More
The cost of security breaches

3 min read

The cost of security breaches

To avoid security breaches' financial and reputational risks, companies must focus on prevention, hire skilled personnel, and use advanced security...

Read More
Encryption in healthcare: The basics

3 min read

Encryption in healthcare: The basics

Encryption protects the healthcare industry for sensitive patient information, ensuring confidentiality, integrity, and authenticity. Healthcare...

Read More
Legal considerations for healthcare marketing and HIPAA

4 min read

Legal considerations for healthcare marketing and HIPAA

Marketing efforts in healthcare must work with requirements outlined in the Health Insurance Portability and Accountability Act (HIPAA), like keeping...

Read More
Investigations escalate in National Public Data breach case

2 min read

Investigations escalate in National Public Data breach case

The data breach at National Public Data, a Florida-based public records data broker, has led to a series of investigations, legal actions, and...

Read More
What is a HIPAA corrective action plan?

3 min read

What is a HIPAA corrective action plan?

A HIPAA corrective action plan is the enforcement process when a covered entity or business associate violates HIPAA regulations. It rectifies...

Read More
What is a HIPAA disaster recovery plan?

3 min read

What is a HIPAA disaster recovery plan?

A HIPAA disaster recovery plan details procedures for restoring any data loss resulting from a disaster. It ensures the security and availability of...

Read More
Ransomware attacks increase: $460 million paid in H1 2024

2 min read

Ransomware attacks increase: $460 million paid in H1 2024

Recent findings reveal increased ransomware attacks and profitability, raising concerns about current cybersecurity measures.

Read More
What is tokenization?

4 min read

What is tokenization?

Tokenization substitutes sensitive data with unique, randomized tokens without a mathematical relationship to the original information. These tokens...

Read More
Change Healthcare breach exposes gaps in healthcare cybersecurity

4 min read

Change Healthcare breach exposes gaps in healthcare cybersecurity

The ransomware attack on Change Healthcare in February 2024 revealed the vulnerabilities within the sector and the serious consequences of such...

Read More
Analysis of the 2024 Verizon data breach investigation report

3 min read

Analysis of the 2024 Verizon data breach investigation report

The Verizon Data Breach Investigations Report (DBIR) has long been a trusted resource for security professionals, offering an analysis of the latest...

Read More