Image of someone on a computer for blog about Understanding the difference between TTPs and IoCs in cybersecurity

2 min read

Understanding the difference between TTPs and IoCs in cybersecurity

While both Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) are important components of threat detection, they serve different purposes in cybersecurity. IoCs are about detecting threats, and TTPs are about...

Read More
Image of stacks of paper for blog about How to handle sensitive data

2 min read

How to handle sensitive data

Properly handling sensitive data, especially in healthcare, is required for maintaining privacy, security, and regulatory compliance.

Read More
Image of hospital sign for blog about Federal judge dismisses HIPAA violation case against Texas whistleblower

1 min read

Federal judge dismisses HIPAA violation case against Texas whistleblower

A federal judge has dismissed charges against Dr. Eithan Haim, who was accused of violating HIPAA by leaking private patient information from Texas...

Read More
efax logo

1 min read

Is eFax HIPAA compliant? (2025 update)

Based on our research, eFax is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
optimove logo

1 min read

Is Optimove HIPAA compliant? (2025 update)

Based on our research, Optimove is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
woopra logo

1 min read

Is Woopra HIPAA compliant? (2025 update)

Based on our research, Woopra is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of key for blog about Encryption methods in healthcare

2 min read

Encryption methods in healthcare

Today's healthcare environment is predominantly digital and can hold many cyber threats, making safeguarding patient information and complying with...

Read More
Image of data points for blog about What is a data lifecycle?

2 min read

What is a data lifecycle?

The data lifecycle refers to the series of stages that data goes through from its creation to its eventual deletion.

Read More
getresponse logo

1 min read

Is GetResponse HIPAA compliant? (2025 update)

Based on our research, GetResponse is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
notion logo

1 min read

Is Notion HIPAA compliant? (2025 update)

Based on our research, Notion is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
digital representation of safety network

1 min read

Is CarrierZone HIPAA compliant? (2025 update)

Based on our research, CarrierZone is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of stethescope and clipboard for blog about What to know about the changes to the HIPAA Security Rule 

1 min read

What to know about the changes to the HIPAA Security Rule 

The Office for Civil Rights (OCR) has announced significant changes to the HIPAA Security Rule, marking the first major update since 2013. These...

Read More
Image of key for blog about What is the Triple Data Encryption Standard?

2 min read

What is the Triple Data Encryption Standard?

The National Institute of Standards and Technology defines the Triple Data Encryption Standard (3DES) as a technique and algorithm used to secure...

Read More