Image of book with pages open.

2 min read

How natural language processing works

Natural language processing is a portion of artificial intelligence that allows computers to understand and interpret human language. With approximately 80% of medical data being unstructured, manually analyzing data can be time-consuming and...

Read More
Image of blue shield with keyhole.

1 min read

Over 70K records exposed in recent Arizona data breach

Around December 13, 2024, Primary Health-SMMPP and U.S. Healthworks-SMMPP, two HIPAA business associates based in Arizona, detected unusual activity...

Read More
Image of individual signing an intake form.

2 min read

The use of natural language processing in interpreting intake forms

The use of Natural Language Processing (NLP) in interpreting intake forms enables automated extraction and analysis of data, streamlining the process...

Read More
Image of handshake.

1 min read

The value of vendor consolidation in healthcare

Reducing the number of vendors is a way for healthcare organizations to improve the efficiency of operations. Operationally, vendor consolidation...

Read More
Image of dental tools.

4 min read

How to respond to a data breach in a dental prcatice

In dental practices, a data breach typically involves the compromise of patient information, such as personal details, medical records, or financial...

Read More
Image of file folders in a cabinet.

2 min read

What are data classifications?

While HIPAA does not require specific data classification levels, organizations often adopt a simple three level classification system. These can...

Read More
unite here logo

1 min read

UNITE HERE settles $6M lawsuit for exposing data of nearly 800K

On October 20, 2023, the New York-based labor union UNITE HERE discovered unauthorized access to its systems, indicating a data breach that...

Read More
Image of shield with keyhole.

2 min read

Applying continuous threat management to email communication audits

Continuous threat management, or continuous threat exposure management (CTEM), is a cybersecurity strategy designed to mitigate threats across an...

Read More
Image of hands holding a heart.

2 min read

Does HIPAA apply to HRAs?

HIPAA applies to Health Reimbursement Arrangements (HRAs) because the plans involve handling protected health information (PHI). HRAs are account...

Read More
digital blue law gavel

2 min read

Healthcare leaders push back against new HIPAA cybersecurity rule

On February 21, 2025, the Association of American Medical Colleges (AAMC), along with several other healthcare organizations, sent a letter urging...

Read More
Is Basecamp HIPAA compliant? (2025 update)

1 min read

Is Basecamp HIPAA compliant? (2025 update)

Based on our research, Basecamp is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
money symbol with stethoscope

2 min read

Section 105(h): Why it matters to HIPAA

Section 105(h) of the Internal Revenue Code relates to self-insured medical reimbursement plans. These rules make sure that plans do not unfairly...

Read More
Is IBM Cloud HIPAA compliant? (2025 update)

2 min read

Is IBM Cloud HIPAA compliant? (2025 update)

Based on our research, IBM Cloud is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More