blue shield

2 min read

What is the difference between IOCs and IOAs?

Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or...

Read More
keyboard with floating people icons

2 min read

Notification requirements if less than 500 individuals are affected

The Breach Notification Rule requires that covered entities follow an outlined process when protected health information (PHI) is inappropriately...

Read More
stack of paperwork

2 min read

Notification requirements if more than 500 individuals are affected

The Breach Notification Rule establishes protocols for handling and responding to significant data breaches involving protected health information...

Read More
HIPAA cloud with digital lock

2 min read

What are the notification requirements after a breach?

Breach notifications are important because they alert individuals whose personal data may have been compromised, helping them take necessary...

Read More
data breach text on paper

2 min read

How to know if your organization has experienced a breach

As seen in the case of the data breach experienced by Familylinks, the organization noticed suspicious activity in one of their employee email...

Read More
clipboard with magnifying glass and security symbols

2 min read

What are the HIPAA requirements after a breach?

Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches...

Read More
digital computer icons in blue

2 min read

SIEMs and their role in breach detection

More than one-third of responding health institutions reported at least one ransomware attack in the preceding year, according to a 2021 report by...

Read More
familylinks logo

2 min read

Familylinks concludes 3-month review of data breach

Familylinks concluded a three-month comprehensive review of all data affected after suspicious activity was detected within one of its employee's...

Read More
blue digital lock

2 min read

What is RSA encryption?

Rivest-ShamirAldeman (RSA) is one of the most widely used security methods for protecting sensitive information. Named after its inventors, Ron...

Read More