2 min read
How to prepare for an HHS investigation after a breach
The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:
Read More
2 min read
The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:
Read More
2 min read
An incident response plan (IRP) is a well-structured approach that outlines how an organization prepares for, detects, responds to, and recovers from...
3 min read
According to a study by Georgia State University, an Intrusion Detection System (IDS) is designed to monitor network traffic or system activities for...
2 min read
Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge,...
2 min read
The Breach Notification Rule requires that covered entities follow an outlined process when protected health information (PHI) is inappropriately...
2 min read
The Breach Notification Rule establishes protocols for handling and responding to significant data breaches involving protected health information...
2 min read
Breach notifications are important because they alert individuals whose personal data may have been compromised, helping them take necessary...
2 min read
As seen in the case of the data breach experienced by Familylinks, the organization noticed suspicious activity in one of their employee email...
2 min read
Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches...
2 min read
More than one-third of responding health institutions reported at least one ransomware attack in the preceding year, according to a 2021 report by...
2 min read
Familylinks concluded a three-month comprehensive review of all data affected after suspicious activity was detected within one of its employee's...
2 min read
Rivest-ShamirAldeman (RSA) is one of the most widely used security methods for protecting sensitive information. Named after its inventors, Ron...