hospital heart monitor

1 min read

Backdoor threat found in widely used patient monitors

What’s new The Cybersecurity and Infrastructure Security Agency (CISA) has identified a backdoor in the firmware of Contec CMS8000 patient monitors, devices widely used in healthcare settings to monitor vital signs such as heart rate, blood...

Read More
Image of computer for blog about Why small healthcare practices are at greater risk for cyberattacks

3 min read

Why small healthcare practices are at greater risk for cyberattacks

Small healthcare practices often face unique challenges that make them particularly vulnerable to cyberattacks. Despite having fewer resources than...

Read More
amplitude logo

1 min read

Is Amplitude Analytics HIPAA compliant? (2025 update)

Based on our research, Amplitude Analytics is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and...

Read More
Image of stethoscope for blog about River Region Cardiology Associates faces 500k person data breach

1 min read

River Region Cardiology Associates faces 500k person data breach

River Region Cardiology Associates has disclosed a data breach that compromised the sensitive personal and protected health information of 500,000...

Read More
venmo logo

1 min read

Is Venmo HIPAA compliant? (2025 update)

Based on our research, Venmo is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
Image of someone in a hood for blog about The anatomy of a phishing attack

3 min read

The anatomy of a phishing attack

Phishing attacks remain one of the most common and effective email security threats, particularly targeting healthcare organizations. According to a...

Read More
Image of gavel for blog about Exploring the HHS Grants Rule and proposed modifications to the Security Rule

1 min read

Exploring the HHS Grants Rule and proposed modifications to the Security Rule

Cybersecurity in healthcare and the management of federal grants emerged as one of the major priorities in 2024, as evidenced by the HHS Office for...

Read More
Image of someone typing for blog about The importance of training for email security

2 min read

The importance of training for email security

When it comes to email security, technology often takes center stage. Encryption, firewalls, and spam filters are tools used for protecting sensitive...

Read More
blue email icon with security lock

3 min read

Email security resolutions for healthcare organizations in the new year

As we step into 2025, healthcare organizations face increasing cybersecurity threats, with email remaining one of the most vulnerable attack vectors.

Read More
email icon with magnifying glass on computer screen

2 min read

Top 5 HIPAA email violations and how to avoid them

Email is one of the most common ways healthcare organizations communicate, but it’s also a leading cause of HIPAA violations. From accidental data...

Read More
digital blue key

2 min read

The future of email encryption: Trends to watch

Email encryptionis evolving rapidly as cyber threats become more sophisticated and regulatory requirements grow stricter.

Read More
digital imagery with hhs logo

1 min read

HHS seeks input on AI governance for HIPAA Security Rule update

The Department of Health and Human Services (HHS) has left artificial intelligence regulation open for discussion in its latest HIPAA Security Rule...

Read More
facebook logo

1 min read

Is Facebook HIPAA compliant? (2025 update)

Based on our research, Facebook is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More