floating digital healthcare icons

2 min read

How outsourcing healthcare services could lead to HIPAA violations

Organizations may choose to outsource for several reasons, including the need to reduce costs, access specialized skills, and improve scalability in response to fluctuating patient volumes. However, outsourcing comes with inherent risks that could...

Read More
digital documents and globe in blue

2 min read

Mechanisms to authenticate electronic protected health information

According to Section 164.312 (c )(2) of the Security Rule’s Technical Safeguards, “Mechanism to authenticate electronic protected health information...

Read More
provider pointing at clipboard with pen

2 min read

Implementation specifications group health plans must abide by

According to the Journal of Occupational and Environmental Medicine, “Under HIPAA, ‘a group health plan, and a health insurance issuer offering group...

Read More
Image of school for blog about PowerSchool data breach raises alarms over student medical privacy

1 min read

PowerSchool data breach raises alarms over student medical privacy

A major education software platform in North America, PowerSchool, experienced a confirmed cyberattack impacting the data of students and teachers.

Read More
Image of someone holding things, like a magnifying glass, to represent data for blog about What are integrity controls? 

1 min read

What are integrity controls? 

According to the Department of Health and Human Services (HHS), integrity means that data has not been altered or destroyed unless unauthorized. A...

Read More
Image of someone on a computer for blog about Understanding anti-malware protection

2 min read

Understanding anti-malware protection

With the prevalence of cyber threats, anti-malware protections serve as a frontline defense against malicious software that can disrupt services....

Read More
Image of laptop for blog about What are technology-neutral standards? 

3 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
stethoscope on files

1 min read

Las Palmas Del Sol Healthcare faces insider data breach

Las Palmas Del Sol Healthcare in El Paso, Texas, has disclosed an insider data breach involving a former employee's unauthorized access to patient...

Read More
radiology screen/images

1 min read

Radiology provider faces lawsuit following data breach

A class action lawsuit claims Akumin failed to protect patient info before a cyberattack.

Read More
Image of lock for blog about What is static application security testing?

2 min read

What is static application security testing?

Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining...

Read More
Image of emails for blog about What is vulnerability testing?

2 min read

What is vulnerability testing?

Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...

Read More