Image of someone analyzing data for blog about Do forensic firms need to be HIPAA compliant? 

2 min read

Do forensic firms need to be HIPAA compliant? 

Forensic firms are mostly responsible for analyzing the systems of organizations extensively, usually following a data breach. Through their work, they frequently encounter patient data, making them business associates. Thus, they must abide by a...

Read More
Image of hands for blog about What is the role of social awareness in mental health communications?

2 min read

What is the role of social awareness in mental health communications?

Social awareness is the ability to recognize and understand the emotions, thoughts, and perspectives of others. The concept is often reflected in how...

Read More
stethoscope with computer data

2 min read

Why healthcare organizations are common targets for data breaches

The motive behind a data breach is often reflected in the financial, ideological, and strategic interests of threat actors.It is especially financial...

Read More
Image of lock for blog about Massive data breach exposes 34,000 patients' PHI

1 min read

Massive data breach exposes 34,000 patients' PHI

The HHS announced a $1.19 million penalty against Gulf Coast Pain Consultants, LLC for multiple violations of the HIPAA Security Rule.

Read More
Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These...

Read More
blue yonder logo

1 min read

Blue Yonder data breach exposes supply chain vulnerabilities

Blue Yonder experienced a data breach, compromising its operations and potentially clients relying on the supply chain management solution.

Read More
Image of stick figures excluding another figure for blog about Addressing implicit biases in email communication

2 min read

Addressing implicit biases in email communication

Implicit biases are the unconscious attitudes and stereotypes that influence how people make decisions. These biases can exist in healthcare...

Read More
Image of tiles falling over for blog about Does vulnerability management have a place in healthcare?

2 min read

Does vulnerability management have a place in healthcare?

Vulnerability management is the process of identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, which...

Read More
Image of religious symbols for blog about How belief systems and religion should factor into written communications 

2 min read

How belief systems and religion should factor into communication

Religious beliefs often influence the way people view health and acceptable treatments. While communication between patient and provider should...

Read More
Image of files transferring between individuals or computers for blog about The role of clearinghouses in PHI exchanges

2 min read

The role of clearinghouses in PHI exchanges

Clearinghouses assist protected health information (PHI) exchanges by acting as intermediaries between healthcare providers and insurance companies....

Read More
Image of computer hardware for blog about What is operational technology? 

2 min read

What is operational technology? 

Operational technology (OT) is the hardware and software systems that monitor, control and manage operations. OT systemswhen combined with...

Read More
computer code on screen

1 min read

Michigan medical practice exposes patient data in email breach

East Paris Internal Medicine Associates, PC, recently experienced a data breach affecting thousands of individuals through an email-related attack.

Read More
law gavel

1 min read

Online pharmacy hit with $7.5M settlement after massive data breach

Post Meds recently settled a class action lawsuit for $7.3 million following a 2023 data breach exposing the information of millions of affected...

Read More