Image of email icon for blog about Understanding ephemeral messaging

1 min read

Understanding ephemeral messaging

Ephemeral messaging refers to sending digital messages that automatically disappear after a certain period.

Read More
Image of a stack of paper for blog on What are nonrepudiation controls?

1 min read

What are nonrepudiation controls?

Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...

Read More
Image of the world for blog about Understanding data sovereignty

2 min read

Understanding data sovereignty

A journal article published in Big Data & Society states that data sovereignty “typically relates in some way to meaningful control, ownership, and...

Read More
security breach lock for post Patelco Credit Union experiences data breach affecting over a million

1 min read

Patelco Credit Union experiences data breach affecting over a million

In June 2024 Patelco Credit Union fell victim to a ransomware attack that compromised the personal information of over one million current and former...

Read More
mālama i ke ola health center logo image for post Maui health center hit by ransomware attack

1 min read

Maui health center hit by ransomware attack

Mālama I Ke Ola Health Center experienced a security incident resulting in unauthorized access.

Read More
An image of several file folders for a blog about what is a designated record set

2 min read

What is a designated record set

A designated record set is a collection of records used to make decisions related to patient care. The record also provides patients with access to...

Read More
Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More
UMC health system forced to divert patients amidst ransomware attack

1 min read

UMC health system forced to divert patients amidst ransomware attack

A ransomware attack forced UMC to divert their patients to other facilities due to large scale IT outages affecting essential services.

Read More
CISA unveils cybersecurity plan to protect federal agencies

2 min read

CISA unveils cybersecurity plan to protect federal agencies

The CISA has released a federal plan to improve cybersecurity coordination and defense across over 100 federal agencies.

Read More
HHS OIG report flags Medicare remote patient monitoring systems

1 min read

HHS OIG report flags Medicare remote patient monitoring systems

On September 24, 2024, the HHS OIG released a report illustrating the need for improved oversight of remote patient monitoring in Medicare.

Read More
PHI use for nontreatment purposes

1 min read

PHI use in nontreatment purposes

Nontreatment uses of patient data are generally handled by administrative staff for purposes like billing or marketing. These administrative purposes...

Read More
Understanding automatic logoffs

2 min read

Understanding automatic logoffs

Automatic logoffs are designed to automatically sign users out of a system after a specified period of inactivity. This function is essential in...

Read More
Physical safeguards for email servers

1 min read

Physical safeguards for email servers

Email servers manage and store email communications, allowing users to send, receive, and organize emails. Given the role of these servers in...

Read More