Image of religious symbols for blog about How belief systems and religion should factor into written communications 

2 min read

How belief systems and religion should factor into communication

Religious beliefs often influence the way people view health and acceptable treatments. While communication between patient and provider should remain neutral, practitioners should consider their patient’s beliefs to approach their wellness and...

Read More
Image of files transferring between individuals or computers for blog about The role of clearinghouses in PHI exchanges

2 min read

The role of clearinghouses in PHI exchanges

Clearinghouses assist protected health information (PHI) exchanges by acting as intermediaries between healthcare providers and insurance companies....

Read More
Image of computer hardware for blog about What is operational technology? 

2 min read

What is operational technology? 

Operational technology (OT) is the hardware and software systems that monitor, control and manage operations. OT systemswhen combined with...

Read More
computer code on screen

1 min read

Michigan medical practice exposes patient data in email breach

East Paris Internal Medicine Associates, PC, recently experienced a data breach affecting thousands of individuals through an email-related attack.

Read More
law gavel

1 min read

Online pharmacy hit with $7.5M settlement after massive data breach

Post Meds recently settled a class action lawsuit for $7.3 million following a 2023 data breach exposing the information of millions of affected...

Read More
Image of hacker for blog about Atlantic Orthopaedic Specialists hit by email breach

1 min read

Atlantic Orthopaedic Specialists hit by email breach

On August 6, 2024, Atlantic Orthopaedic Specialists, also known as Vann Virginia Center for Orthopaedics, discovered unauthorized access to one of...

Read More
Image of someone hacking into a computer for blog about What is a Smurf attack?

2 min read

What is a Smurf attack?

A smurf attack is a type of distributed denial of service (DDos) attack where the attacker uses a network's broadcast addresses to flood a target...

Read More
digital globe with floating lock icons

2 min read

What are nation states?

Nation states are groups or organizations affiliated with a government that direct cyber operations in a way that advances their national interest....

Read More
library of congress

1 min read

Library of Congress email systems breached in a cyberattack

The Library of Congress was hacked earlier in 2024 by adversaries. The attack was targeted against the organization's email accounts.

Read More
US mission to the UN logo seal

1 min read

Global leaders unite to combat ransomware attacks on healthcare systems

A joint statement by the United States Mission to the United Nations was released in November 2024, calling for countries to take action against...

Read More
Image of individuals in therapy for blog about How to share coping strategies for patients estranged from family 

2 min read

How to share coping strategies for patients estranged from family

HIPAA compliant email offers a secure and reliable complement to therapy practices. Patients benefit from consistent support while providers are...

Read More
Image of hands for blog about Collaborative communication during SUD treatment

3 min read

Collaborative communication during SUD treatment

A collaborative Substance Use Disorder (SUD) treatment process provides patients with a higher level of care to heal and recover. To do this, SUD...

Read More
Robert F. Kennedy Credit: Wikimedia Commons Gage Skidmore

1 min read

Trump picks Robert F. Kennedy Jr. to lead health department

Donald Trump announced his selection of Robert F. Kennedy as his nominee as the Secretary of the HHS.

Read More