Image of email icons for blog about What happens when your email provider experiences a data breach

3 min read

What happens when your email provider experiences a breach

Email attacks are responsible for 18.1% of healthcare breaches. When your email provider experiences a data breach involving protected health information (PHI), the provider and your organization must take action immediately by notifying your...

Read More
Image of puzzle for blog about Is emailing about a colleague's medical condition a HIPAA violation?

2 min read

Is emailing about a colleague's medical condition a HIPAA violation?

Emailing about a colleague's medical condition is a HIPAA violation. Medical information about a colleague is considered protected health information...

Read More
laptop with floating data for post Healthcare breach roundup: Week of 9/30/24

2 min read

Healthcare breach roundup: Week of 9/30/24

Healthcare data breaches expose sensitive information of patients and clients. Despite advances in cybersecurity, healthcare organizations remain...

Read More
Image of individual typing with an email icon for blog about What to do when patient emails contain too much PHI

3 min read

What to do when patient emails contain too much PHI

If emails from patients contain too much PHI, acknowledge the email securely using a HIPAA compliant system, avoid replying with additional sensitive...

Read More
Image of someone on computer for blog about Online mental health intake forms and HIPAA

3 min read

Online mental health intake forms and HIPAA

Your mental health intake forms meet HIPAA standards when they ensure the protection of patient data through encryption, collect only the minimum...

Read More
Image of doctor checking the pulse of a patient for a blog about HIPAA compliance risks during mass health screenings

2 min read

HIPAA compliance risks during mass health screenings

The main HIPAA risks during mass health screenings include lack of privacy in screening areas, improper handling of paper or digital records,...

Read More
Image of someone's back facing the viewer for a blog about DDos attacks and their impact on HIPAA compliance

2 min read

DDos attacks and their impact on HIPAA compliance

A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...

Read More
Image of shield for blog about Summary of the CISA FOCAL plan

2 min read

Summary of the CISA FOCAL plan

CISA released the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan on September 16, 2024, to provide...

Read More
Image of someone texting for a blog about what is text bombing?

4 min read

What is text bombing?

Text bombing is a type of cyber harassment where someone sends a large number of unsolicited text messages to a target's phone in a short period....

Read More
Graphic of multiple envelopes for a blog about keeping auto-responses HIPAA compliant

2 min read

Keeping auto-responses HIPAA compliant

Healthcare organizations must ensure they do not share protected health information (PHI) in automatic reply messages to comply with HIPAA...

Read More
Is it against HIPAA to give results over the phone?

2 min read

Is it against HIPAA to give results over the phone?

No, it is not necessarily against HIPAA to give results over the phone. Still, it requires careful adherence to specific guidelines. Healthcare...

Read More
Sharing substance abuse records under HIPAA and 42 CFR Part

2 min read

Sharing substance abuse records under HIPAA and 42 CFR Part

Under HIPAA and the 42 CFR Part 2 rule, substance abuse records can be shared with one written patient consent form for future uses and disclosures...

Read More
How to document HIPAA compliance efforts

2 min read

How to document HIPAA compliance efforts

Healthcare organizations must document HIPAA compliance efforts to safeguard patient information, mitigate legal risks, and prove adherence to...

Read More