holding hands for post Characteristics of effective communication in a mental health setting

4 min read

Characteristics of effective communication in a mental health setting

Communication in mental health creates a supportive and understanding environment where individuals feel safe to share their thoughts and emotions. By implementing the characteristics of effective communication in a mental health setting, mental...

Read More
provider at computer for post When is accessing medical records a HIPAA breach?

2 min read

When is accessing medical records a HIPAA breach?

Accessing medical records constitutes a breach if it involves unauthorized access, use, or disclosure that compromises the security or privacy of PHI.

Read More
microsoft logo for post Microsoft report uncovers cybersecurity threat to critical U.S. sectors

2 min read

Microsoft report uncovers cybersecurity threat to critical U.S. sectors

A recently released report by Microsoft shows a cybersecurity group seemingly posing a risk to healthcare organizations.

Read More
Image of someone at a computer for blog about Baptist Health suffers data breach  

1 min read

Baptist Health suffers data breach

Baptist Health Medical Center has begun notifying affected patients following unauthorized access to their IT environment.

Read More
Image of someone holding a clock for blog about Granular retention schedules and HIPAA 

2 min read

Granular retention schedules and HIPAA

Granular retention schedules allow healthcare organizations to precisely classify and manage emails based on their content. The approach reduces the...

Read More
Image of padlock for article about understanding contingency operations for email

1 min read

Understanding contingency operations for email

Contingency operations refer to military and governmental activities to prepare for, respond to, or recover from unforeseen events or emergencies....

Read More
Image of email icon for blog about Understanding ephemeral messaging

1 min read

Understanding ephemeral messaging

Ephemeral messaging refers to sending digital messages that automatically disappear after a certain period.

Read More
Image of a stack of paper for blog on What are nonrepudiation controls?

1 min read

What are nonrepudiation controls?

Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...

Read More
Image of the world for blog about Understanding data sovereignty

2 min read

Understanding data sovereignty

A journal article published in Big Data & Society states that data sovereignty “typically relates in some way to meaningful control, ownership, and...

Read More
security breach lock for post Patelco Credit Union experiences data breach affecting over a million

1 min read

Patelco Credit Union experiences data breach affecting over a million

In June 2024 Patelco Credit Union fell victim to a ransomware attack that compromised the personal information of over one million current and former...

Read More
mālama i ke ola health center logo image for post Maui health center hit by ransomware attack

1 min read

Maui health center hit by ransomware attack

Mālama I Ke Ola Health Center experienced a security incident resulting in unauthorized access.

Read More
An image of several file folders for a blog about what is a designated record set

2 min read

What is a designated record set

A designated record set is a collection of records used to make decisions related to patient care. The record also provides patients with access to...

Read More
Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More