What is a virtual network function?

1 min read

What is a virtual network function?

Network function virtualization is a technology that transforms traditional network functions from hardware-based solutions into software applications that run on standard servers.

Read More
Understanding the different medical claim forms

1 min read

Understanding the different medical claim forms

Medical claims are form requests submitted by healthcare providers to insurance companies and government programs for reimbursement for services...

Read More
Deepfake technology in social engineering attacks

2 min read

Deepfake technology in social engineering attacks

The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...

Read More
Handling the mental health impacts of climate change in vulnerable populations

2 min read

Handling the mental health impacts of climate change

When individuals face severe consequences like losing homes or enduring the stress of displacement, there is a need for immediate psychological help...

Read More
When can a GP share information when treating the same family?

2 min read

When can a GP share information with family?

A General Practitioner (GP) can share information between family members with their permission, during care coordination, or in emergencies.

Read More
What are predictive analytics exploits?

1 min read

What are predictive analytics exploits?

Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions...

Read More
When are shadow records a risk to healthcare cybersecurity?

1 min read

When are shadow records a risk to healthcare cybersecurity?

Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...

Read More
Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
What is charge capture?

2 min read

What is charge capture?

Charge capture is recording and submitting for reimbursement all medical procedures and services provided to a patient within the provider's care.

Read More
What is rate limiting?

1 min read

What is rate limiting?

Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.

Read More
Fortinet reports a limited data breach

1 min read

Fortinet reports a limited data breach

Fortinet has experienced a breach the company claims had minimal security implications.

Read More
Are cannabis dispensaries covered entities under HIPAA?

1 min read

Are cannabis dispensaries covered entities under HIPAA?

No, marijuana dispensaries are not covered entities.

Read More
United Way of Connecticut and UConn Health suffer data breaches

1 min read

United Way of Connecticut and UConn Health suffer data breaches

Two Connecticut healthcare providers recently experienced cyberattacks involving compromised email accounts.

Read More