Image of someone typing.

4 min read

How legacy devices create backdoors into healthcare systems

Legacy devices create systematic backdoors through four primary vulnerabilities namely unpatched software, network exposure, default configurations, and interoperability gaps. The consequences cascade through healthcare ecosystems.

Read More
Is CentralReach HIPAA Compliant? (2025 update)

1 min read

Is CentralReach HIPAA Compliant? (2025 update)

Based on our research, CentralReach is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
graphic of medical symbols and digital locks on clipboard

5 min read

How to navigate the 2025 authorization landscape

In 2025, the US healthcare landscape is witnessing notable changes in authorization processes as a whole (both prior authorizations and patient...

Read More
oracle health logo

1 min read

Oracle Health faces backlash after hack exposes patient data

In January 2025, Oracle Health, which acquired Cerner and its electronic health record (EHR) system in 2022, experienced a hacking incident involving...

Read More
Is Acquia HIPAA compliant? (2025 update)

1 min read

Is Acquia HIPAA compliant? (2025 update)

Based on our research, Acquia is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
Is Intermedia HIPAA compliant? (2025 update)

1 min read

Is Intermedia HIPAA compliant? (2025 update)

Based on our research, Intermedia is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
Image of stethescope over health insurance paperwork.

4 min read

The role of the National Provider Identifier (NPI) in health communications

The National Provider Identifier (NPI) is designed to simplify administrative and financial transactions by assigning a unique identifier to...

Read More
Image of a hospital entrance.

1 min read

College Hospital Costa Mesa data breach sparks legal investigation

In March 2025, College Hospital Costa Mesa revealed that a forensic investigation into a 2024 data breach uncovered that additional patients were...

Read More
Is Wrike HIPAA compliant? (2025 update)

1 min read

Is Wrike HIPAA compliant? (2025 update)

Based on our research, Wrike is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
Image of football player getting tackled.

4 min read

HIPAA coverage for athletic medical staff

HIPAA applies to athletic medical staff when they work for covered entities, like hospitals, health centers, or sports medicine clinics that engage...

Read More
Image of nurse talking to elderly patient.

4 min read

How capacity is impacted by data privacy

Decision capacity focuses on an individual’s ability to make decisions for themselves. Determining an individual’s capacity is based on criteria of...

Read More
Image of a hand stopping falling blocks.

5 min read

The building blocks of risk management in healthcare facilities

The building blocks of risk management in healthcare facilities form a structured, cyclical process centered on proactive mitigation and...

Read More
Image of a man's darkened profile to represent anonymity.

4 min read

De-identification techniques impact for clinical care and research

Ultimately, de-identification remains a double-edged sword as it is necessary for privacy compliance, but is not a standalone solution. In clinical...

Read More