
2 min read
OCR to resume HIPAA privacy audits after 7-year gap
After a seven-year break, the Office for Civil Rights (OCR) restarts its HIPAA privacy audits because of the surge in cyberattacks targeting healthcare organizations.
Read More2 min read
After a seven-year break, the Office for Civil Rights (OCR) restarts its HIPAA privacy audits because of the surge in cyberattacks targeting healthcare organizations.
Read More2 min read
Monument Health has become the latest healthcare provider to report its fallout due to the Change Healthcare data breachthat was discovered in...
1 min read
Regional Care, Inc. (RCI) recently announced a data breach that exposed the sensitive information of over 225,000 individuals. The breach, detected...
2 min read
The advancement of technology, particularly in artificial intelligence (AI) and automation, is challenging traditional approaches to healthcare data...
3 min read
Email-based threats have become one of the most pervasive cybersecurity challenges, affecting 90% of global organizations and causing an estimated...
2 min read
According to a study inBMJ Health Care Informatics, 2-3% of email and internet traffic in healthcare organizations is flagged as suspicious, equating...
3 min read
A zero-day exploit, also known as a zero-day threat, is an attack that targets a security vulnerability for which no patch or fix is available. The...
1 min read
When HIPAA guidelines are violated, it can lead to psychological and emotional consequences, social and interpersonal impacts, erosion of trust in...
3 min read
The HIPAA Breach Notification Rule ensures that covered entities promptly inform individuals when there is a breach of their Protected Health...
1 min read
Attack surfaces are all the points where an unauthorized user can access a system and extract data. Cloudflare states, “It is essentially like all...
2 min read
The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:
2 min read
An incident response plan (IRP) is a well-structured approach that outlines how an organization prepares for, detects, responds to, and recovers from...
3 min read
According to a study by Georgia State University, an Intrusion Detection System (IDS) is designed to monitor network traffic or system activities for...