1 min read
UMC health system forced to divert patients amidst ransomware attack
A ransomware attack forced UMC to divert their patients to other facilities due to large scale IT outages affecting essential services.
Read More1 min read
A ransomware attack forced UMC to divert their patients to other facilities due to large scale IT outages affecting essential services.
Read More2 min read
The CISA has released a federal plan to improve cybersecurity coordination and defense across over 100 federal agencies.
1 min read
On September 24, 2024, the HHS OIG released a report illustrating the need for improved oversight of remote patient monitoring in Medicare.
1 min read
Nontreatment uses of patient data are generally handled by administrative staff for purposes like billing or marketing. These administrative purposes...
2 min read
Automatic logoffs are designed to automatically sign users out of a system after a specified period of inactivity. This function is essential in...
1 min read
Email servers manage and store email communications, allowing users to send, receive, and organize emails. Given the role of these servers in...
2 min read
HIPAA prohibits healthcare staff from sharing forms of patient data on their personal social media accounts.
2 min read
HIPAA applies to fundraising activities if patient data is used in communications meant for acquiring potential donors.
2 min read
School immunization records are protected by HIPAA when they are created and maintained by covered entities rather than schools. In this instance,...
1 min read
The FCC and AT&T have settled in the aftermath of the mobile company's 2024 data breach.
2 min read
The genetic testing and ancestry company 23andMe has agreed to a $30 million settlement after a class-action lawsuit was filed against it for a...
2 min read
The cost to send a fax varies widely, ranging from a few cents per page with online services to a few thousand dollars to purchase and maintain a...
1 min read
Vulnerabilities in email archiving include email spoofing and phishing attacks leading to unauthorized access or data tampering. These...