Image of tablet, laptop, and phone, for blog about how to handle the threat of lost devices 

2 min read

How to handle the threat of lost devices 

With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime targets for theft based on the value of the items. When targeted, the loss of equipment is only compounded...

Read More
Image of lock for blog about Maryland cybersecurity conference rallies leaders against cybercrime

2 min read

Maryland cybersecurity conference rallies leaders against cybercrime

On November 7, 2024, the U.S. Attorney’s Office for the District of Maryland and the University of Maryland hosted a cybersecurity conference to...

Read More
Image of someone typing on a computer for blog about Why psychiatrists should care about their background in virtual sessions

2 min read

Why psychiatrists should care about backgrounds in virtual sessions

When psychiatrists conduct virtual sessions, the potential risk posed by the background setting is often overlooked. Small things like an Alexa...

Read More
Image of healthcare practicioner taking notes for blog about The impact of maternal care on mental health

3 min read

The impact of maternal care on mental health

When their mental health information is kept secure and confidential, mothers are more likely to be open about their feelings and any issues they're...

Read More
law firm image for post Missouri law firm experiences data breach impacting healthcare client

1 min read

Missouri law firm experiences data breach impacting healthcare client

Thompson Coburn faced a targeted hacking incident, resulting in unauthorized access to sensitive files related to their client, Presbyterian...

Read More
Kaiser Permanente logo for post Email breach at Kaiser Permanente exposes patient data in Oakland

1 min read

Email breach at Kaiser Permanente exposes patient data in Oakland

On November 1, 2024, Kaiser Permanente notified patients of a recent data breach affecting over 40,000 patients. Threat actors gained access to the...

Read More
laptop with lock icon for post Massive breach at Mystic Valley Elder Services exposes info of 87,000

1 min read

Massive breach at Mystic Valley Elder Services exposes info of 87,000

Mystic Valley Elder Services (MVES) experienced a security incident earlier this year, resulting in the exposure of over 80,000 patients' data.

Read More
Image of individuals and computers to represent a network for blog about Understanding micro-segmentation

1 min read

Understanding micro-segmentation

While HIPAA does not explicitly mention micro-segmentation, it is a security approach aligning with HIPAA’s security requirements by limiting access...

Read More
medical symbol in blue digital environment for post What is the 405(d) effort?

2 min read

What is the 405(d) effort?

405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...

Read More
Image of someone holding a phone and stars to signify a review for blog about How psychiatrists should respond to negative reviews

1 min read

How psychiatrists should respond to negative reviews

Negative reviews can be a stressful situation for any medical professional. Reviews often drive psychiatrists to want to clarify or defend their...

Read More
doctor touching medical symbol for post What are nonroutine disclosures of PHI under HIPAA?

2 min read

What are non-routine disclosures of PHI under HIPAA?

Non-routine disclosures refer to the instances where protected health information (PHI)is shared for unique or unexpected situations. These...

Read More
digital globe with web domain space for post What are homograph domain attacks?

2 min read

What are homograph domain attacks? 

People are often lulled into a sense of security by familiar domains, leading to accessing websites and communications without much thought. Threat...

Read More
digital business icons over a laptop screen for post Instances where the minimum necessary standard does not apply

1 min read

Instances where the minimum necessary standard does not apply

There are cases where full access to patient health is necessary, such as for diagnosis or public health purposes.The minimum necessary standard...

Read More