Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as healthcare practices use many different tools. Healthcare organizations that need to protect protected...

Read More
childrens hospital colorado logo

1 min read

Children’s Hospital Colorado fined $548K for HIPAA violations

Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.

Read More
blue digital check boxes

3 min read

Do you need a dedicated HIPAA compliance officer?

While organizations have flexibility in structuring their compliance functions, having dedicated HIPAA compliance staff can help ensure ongoing...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

3 min read

The uses of control analyses in email

A Journal of the American Medical Informatics Association qualitative analysis looking at email communication between patients and providers noted...

Read More
Image of hands for blog about What is the role of social awareness in mental health communications?

2 min read

What is the role of social awareness in mental health communications?

Social awareness is the ability to recognize and understand the emotions, thoughts, and perspectives of others. The concept is often reflected in how...

Read More
stethoscope with computer data

2 min read

Why healthcare organizations are common targets for data breaches

The motive behind a data breach is often reflected in the financial, ideological, and strategic interests of threat actors.It is especially financial...

Read More
Image of lock for blog about Massive data breach exposes 34,000 patients' PHI

1 min read

Massive data breach exposes 34,000 patients' PHI

The HHS announced a $1.19 million penalty against Gulf Coast Pain Consultants, LLC for multiple violations of the HIPAA Security Rule.

Read More
Image of shield for blog about What are forensic protocols?

4 min read

What are forensic protocols?

Proper forensic protocols dictate that each piece of evidence must be carefully documented, photographed, and labeled to maintain a chain of custody...

Read More
blue yonder logo

1 min read

Blue Yonder data breach exposes supply chain vulnerabilities

Blue Yonder experienced a data breach, compromising its operations and potentially clients relying on the supply chain management solution.

Read More
Image of stick figures excluding another figure for blog about Addressing implicit biases in email communication

2 min read

Addressing implicit biases in email communication

Implicit biases are the unconscious attitudes and stereotypes that influence how people make decisions. These biases can exist in healthcare...

Read More
Image of tiles falling over for blog about Does vulnerability management have a place in healthcare?

2 min read

Does vulnerability management have a place in healthcare?

Vulnerability management is the process of identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, which...

Read More
Image of religious symbols for blog about How belief systems and religion should factor into written communications 

2 min read

How belief systems and religion should factor into communication

Religious beliefs often influence the way people view health and acceptable treatments. While communication between patient and provider should...

Read More