digital documents and globe in blue

2 min read

Mechanisms to authenticate electronic protected health information

According to Section 164.312 (c )(2) of the Security Rule’s Technical Safeguards, “Mechanism to authenticate electronic protected health information (Addressable). Implement electronic mechanisms to corroborate that electronic protected health...

Read More
provider pointing at clipboard with pen

2 min read

Implementation specifications group health plans must abide by

According to the Journal of Occupational and Environmental Medicine, “Under HIPAA, ‘a group health plan, and a health insurance issuer offering group...

Read More
Image of school for blog about PowerSchool data breach raises alarms over student medical privacy

1 min read

PowerSchool data breach raises alarms over student medical privacy

A major education software platform in North America, PowerSchool, experienced a confirmed cyberattack impacting the data of students and teachers.

Read More
Image of someone holding things, like a magnifying glass, to represent data for blog about What are integrity controls? 

1 min read

What are integrity controls? 

According to the Department of Health and Human Services (HHS), integrity means that data has not been altered or destroyed unless unauthorized. A...

Read More
Image of someone on a computer for blog about Understanding anti-malware protection

2 min read

Understanding anti-malware protection

With the prevalence of cyber threats, anti-malware protections serve as a frontline defense against malicious software that can disrupt services....

Read More
Image of laptop for blog about What are technology-neutral standards? 

1 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
stethoscope on files

1 min read

Las Palmas Del Sol Healthcare faces insider data breach

Las Palmas Del Sol Healthcare in El Paso, Texas, has disclosed an insider data breach involving a former employee's unauthorized access to patient...

Read More
digital screen with text chatgpt

3 min read

The use of ChatGPT in healthcare

When considering which model would be better suited for healthcare, ChatGPT-4 has improved accuracy. Its capacity to handle intricate queries makes...

Read More
radiology screen/images

1 min read

Radiology provider faces lawsuit following data breach

A class action lawsuit claims Akumin failed to protect patient info before a cyberattack.

Read More
Image of lock for blog about What is static application security testing?

2 min read

What is static application security testing?

Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining...

Read More
Image of emails for blog about What is vulnerability testing?

2 min read

What is vulnerability testing?

Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...

Read More
Image of shield for blog about Understanding cybersecurity performance goals 

2 min read

Understanding cybersecurity performance goals 

Released in January 2024, the HHS Cybersecurity Performance Goals (CPGs) are designed to help healthcare organizations prioritize necessary security...

Read More