Image of stethoscope for blog about River Region Cardiology Associates faces 500k person data breach

1 min read

River Region Cardiology Associates faces 500k person data breach

River Region Cardiology Associates has disclosed a data breach that compromised the sensitive personal and protected health information of 500,000 individuals. The breach was reported to the U.S. Department of Health and Human Services Office for...

Read More
venmo logo

1 min read

Is Venmo HIPAA compliant? (2025 update)

Based on our research, Venmo is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
Image of someone in a hood for blog about The anatomy of a phishing attack

3 min read

The anatomy of a phishing attack

Phishing attacks remain one of the most common and effective email security threats, particularly targeting healthcare organizations. According to a...

Read More
Image of gavel for blog about Exploring the HHS Grants Rule and proposed modifications to the Security Rule

1 min read

Exploring the HHS Grants Rule and proposed modifications to the Security Rule

Cybersecurity in healthcare and the management of federal grants emerged as one of the major priorities in 2024, as evidenced by the HHS Office for...

Read More
Image of someone typing for blog about The importance of training for email security

2 min read

The importance of training for email security

When it comes to email security, technology often takes center stage. Encryption, firewalls, and spam filters are tools used for protecting sensitive...

Read More
blue email icon with security lock

3 min read

Email security resolutions for healthcare organizations in the new year

As we step into 2025, healthcare organizations face increasing cybersecurity threats, with email remaining one of the most vulnerable attack vectors.

Read More
email icon with magnifying glass on computer screen

2 min read

Top 5 HIPAA email violations and how to avoid them

Email is one of the most common ways healthcare organizations communicate, but it’s also a leading cause of HIPAA violations. From accidental data...

Read More
digital blue key

2 min read

The future of email encryption: Trends to watch

Email encryptionis evolving rapidly as cyber threats become more sophisticated and regulatory requirements grow stricter.

Read More
digital imagery with hhs logo

1 min read

HHS seeks input on AI governance for HIPAA Security Rule update

The Department of Health and Human Services (HHS) has left artificial intelligence regulation open for discussion in its latest HIPAA Security Rule...

Read More
facebook logo

1 min read

Is Facebook HIPAA compliant? (2025 update)

Based on our research, Facebook is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of someone on a computer for blog about Understanding the difference between TTPs and IoCs in cybersecurity

2 min read

Understanding the difference between TTPs and IoCs in cybersecurity

While both Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) are important components of threat detection, they serve...

Read More
Image of stacks of paper for blog about How to handle sensitive data

2 min read

How to handle sensitive data

Properly handling sensitive data, especially in healthcare, is required for maintaining privacy, security, and regulatory compliance.

Read More
Image of hospital sign for blog about Federal judge dismisses HIPAA violation case against Texas whistleblower

1 min read

Federal judge dismisses HIPAA violation case against Texas whistleblower

A federal judge has dismissed charges against Dr. Eithan Haim, who was accused of violating HIPAA by leaking private patient information from Texas...

Read More