Image of someone on a computer for blog about Understanding anti-malware protection

2 min read

Understanding anti-malware protection

With the prevalence of cyber threats, anti-malware protections serve as a frontline defense against malicious software that can disrupt services. These protections are made of different detection techniques, like signature-based scanning, that...

Read More
Image of laptop for blog about What are technology-neutral standards? 

1 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
stethoscope on files

1 min read

Las Palmas Del Sol Healthcare faces insider data breach

Las Palmas Del Sol Healthcare in El Paso, Texas, has disclosed an insider data breach involving a former employee's unauthorized access to patient...

Read More
digital screen with text chatgpt

3 min read

The use of ChatGPT in healthcare

When considering which model would be better suited for healthcare, ChatGPT-4 has improved accuracy. Its capacity to handle intricate queries makes...

Read More
radiology screen/images

1 min read

Radiology provider faces lawsuit following data breach

A class action lawsuit claims Akumin failed to protect patient info before a cyberattack.

Read More
Image of lock for blog about What is static application security testing?

2 min read

What is static application security testing?

Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining...

Read More
Image of emails for blog about What is vulnerability testing?

2 min read

What is vulnerability testing?

Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...

Read More
Image of shield for blog about Understanding cybersecurity performance goals 

2 min read

Understanding cybersecurity performance goals 

Released in January 2024, the HHS Cybersecurity Performance Goals (CPGs) are designed to help healthcare organizations prioritize necessary security...

Read More
Image of shield for blog about HHS proposes historic HIPAA Security Rule update to combat rising cyber threats

1 min read

HHS proposes HIPAA Security Rule update to combat rising cyber threats

The HHS Office for Civil Rights proposed updates to the HIPAA Security Rule, marking the first major revision since 2013, to address the growing...

Read More
Image for blog about What is a CI/CD pipeline? 

2 min read

What is a CI/CD pipeline?

The Continuous Integration and Continuous Delivery (or Deployment) pipeline (CI/CD) is a process that automates the processes involved in software...

Read More
hand on stack of files

2 min read

What is the time limit for PHI requests according to HIPAA?

HIPAA requires healthcare providers to respond to a patient’s request for access to their protected health information (PHI) within a specific...

Read More
medical symbol and hand

3 min read

How HIPAA protects collaborative healthcare

Healthcare organizations need to use collaborative healthcare efforts because they help ensure patients receive the best possible care. This need...

Read More