What are predictive analytics exploits?

1 min read

What are predictive analytics exploits?

Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions based on identified patterns and trends.

Read More
When are shadow records a risk to healthcare cybersecurity?

1 min read

When are shadow records a risk to healthcare cybersecurity?

Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...

Read More
Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
What is charge capture?

2 min read

What is charge capture?

Charge capture is recording and submitting for reimbursement all medical procedures and services provided to a patient within the provider's care.

Read More
What is rate limiting?

1 min read

What is rate limiting?

Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.

Read More
Fortinet reports a limited data breach

1 min read

Fortinet reports a limited data breach

Fortinet has experienced a breach the company claims had minimal security implications.

Read More
Are cannabis dispensaries covered entities under HIPAA?

1 min read

Are cannabis dispensaries covered entities under HIPAA?

No, marijuana dispensaries are not covered entities.

Read More
United Way of Connecticut and UConn Health suffer data breaches

1 min read

United Way of Connecticut and UConn Health suffer data breaches

Two Connecticut healthcare providers recently experienced cyberattacks involving compromised email accounts.

Read More
Communicating beyond therapy sessions

1 min read

Communicating beyond therapy sessions

Communication outside the therapy room benefits mood monitoring by allowing real-time tracking of a patient's emotional state.

Read More
What are HIPAA's Other Arrangements?

3 min read

What are HIPAA's Other Arrangements?

Other Arrangements provide government entities with compliant pathways tailored to their specific needs, helping them fulfill their HIPAA obligations...

Read More
Legal marijuana and HIPAA

3 min read

Legal marijuana and HIPAA

When the use of marijuana is prescribed or discussed by a healthcare provider, the information is protected under HIPAA.

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More