Securing patient data in digital consent forms

2 min read

Securing patient data in digital consent forms

Healthcare providers can secure patient data in digital consent forms using strong encryption, robust access controls, and secure storage with regular backups. Implementing firewalls and intrusion detection systems, conducting risk assessments,...

Read More
Including limited data sets in an account of disclosures

1 min read

Including limited data sets in an account of disclosures

Limited data sets are exempt from a patient's right to an accounting of disclosures.

Read More
Confidant Health's unsecured database unveiled by security researcher

1 min read

Confidant Health's unsecured database unveiled by security researcher

On September 6, 2024, Confidant Health’s unsecured database was discovered by a security researcher exposinghighly sensitive information that...

Read More
Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

1 min read

Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

Planned Parenthood has become the latest target in a recent ransomware attack in its Montana branch.

Read More
What is intent based networking?

1 min read

What is intent based networking?

Intent-based networking is a form of network management that uses machine learning and automation.

Read More
Helping loved ones cope with mental illness

2 min read

Helping loved ones cope with mental illness

Loved ones, like family, friends, and mentors, can provide stability and additional support to those facing mental health challenges. Healthcare...

Read More
Inventory optimization in healthcare practices

1 min read

Inventory optimization in healthcare practices

Inventory optimization is the strategic planning surrounding the management of medical supplies to minimize cost and waste.

Read More
What are living off the land attacks?

2 min read

What are living off the land attacks?

Living off the land attacks are when hackers use built-in tools and software already present on a computer to carry out malicious activities...

Read More
Can a covered entity send ePHI through an unsecured app?

2 min read

Can a covered entity send ePHI through an unsecured app?

A covered entity can only send electronic protected health information (ePHI) through an unsecured app if a patient requests it. If a patient asks to...

Read More
HHS withdraws appeal to Texas court ruling in AHA case

1 min read

HHS withdraws appeal to Texas court ruling in AHA case

In June 2023, the US Department of Health and Human Services briefly appealed and then withdrew its appeal against the Texas federal court's decision...

Read More
U.S. Surgeon General releases advisory for parental mental health

2 min read

U.S. Surgeon General releases advisory for parental mental health

A recent advisory from the U.S. Surgeon General discussed the need for mental health support for parents.

Read More
Illinois home care service experiences breach impacting over 26,000

1 min read

Illinois home care service experiences breach impacting over 26,000

The Help at Home breach occurred when a former third partyvendor's network server was hacked, exposing sensitive personal and medical information of...

Read More
Hackers target Aire Dental Arts with ransomware attack

1 min read

Hackers target Aire Dental Arts with ransomware attack

In June 2024, hackers broke into Aire Dental Arts' systems, locked their files with ransomware, and accessed sensitive data, sparking a swift and...

Read More