Image of hacker for blog about How TTPs help organizations identify and combat cyber threats

2 min read

How TTPs help organizations identify and combat cyber threats

According to the National Institute of Standards and Technology (NIST), Tactics, Techniques, and Procedures (TTPs) represent the behavioral patterns and methodologies used by cyber attackers to carry out their malicious activities.

Read More
blue and pink security lock

1 min read

OCR report: Data breaches rise 8.4% in first half of 2024

From January to June 2024, 387 data breaches involving 500 or more records were reported to the Office for Civil Rights (OCR), marking an 8.4%...

Read More
floating legal icons

2 min read

OCR to resume HIPAA privacy audits after 7-year gap

After a seven-year break, the Office for Civil Rights (OCR) restarts its HIPAA privacy audits because of the surge in cyberattacks targeting...

Read More
digital lock in medical environment

2 min read

Monument Health patients affected by Change Healthcare data breach

Monument Health has become the latest healthcare provider to report its fallout due to the Change Healthcare data breachthat was discovered in...

Read More
data server with red and blue lights

1 min read

Regional Care Inc. data breach exposes sensitive information of 225K

Regional Care, Inc. (RCI) recently announced a data breach that exposed the sensitive information of over 225,000 individuals. The breach, detected...

Read More
Image of someone touching icons for email and the cloud for blog about How AI and automation are changing the face of HIPAA compliance

2 min read

How AI and automation are changing the face of HIPAA compliance

The advancement of technology, particularly in artificial intelligence (AI) and automation, is challenging traditional approaches to healthcare data...

Read More
Image of someone tapping a sign that says AI for blog about How AI is revolutionizing email breach detection and response

3 min read

How AI is revolutionizing email breach detection and response

Email-based threats have become one of the most pervasive cybersecurity challenges, affecting 90% of global organizations and causing an estimated...

Read More
hook and digital data

2 min read

Phishing attacks in healthcare: How to protect your organization in 2025

According to a study inBMJ Health Care Informatics, 2-3% of email and internet traffic in healthcare organizations is flagged as suspicious, equating...

Read More
digital code with zero day text

3 min read

What is a zero-day attack?

A zero-day exploit, also known as a zero-day threat, is an attack that targets a security vulnerability for which no patch or fix is available. The...

Read More
provider touching patient hand

1 min read

The impact of HIPAA violations on patient care

When HIPAA guidelines are violated, it can lead to psychological and emotional consequences, social and interpersonal impacts, erosion of trust in...

Read More
hipaa requirements document

3 min read

What happens when you fail to send a breach notification

The HIPAA Breach Notification Rule ensures that covered entities promptly inform individuals when there is a breach of their Protected Health...

Read More
gloved hand on laptop

1 min read

What are attack surfaces and how do cybercriminals exploit them?

Attack surfaces are all the points where an unauthorized user can access a system and extract data. Cloudflare states, “It is essentially like all...

Read More
laptop and magnifying glass

2 min read

How to prepare for an HHS investigation after a breach

The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:

Read More