Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files, datasets, or other information generated by employees, contractors, or systems that operate...

Read More
blue digital lock

2 min read

AAP hit by ransomware: Attackers demand double payment

A ransomware attack by Embargo has allegedly targeted American Associated Pharmacies (AAP). The attackers claim that AAP paid $1.3 million to regain...

Read More
digital concept of medical communications plan

4 min read

Communication policies that align with HIPAA regulations

Creating and implementing communication policies that align with HIPAA regulations ensures compliance, protects patient privacy, and maintains the...

Read More
law gavel on laptop

2 min read

Thousands could receive up to $5,500 from health system data breach settlement

Cummins Behavioral Health Systems has agreed to a $2.1 million class-action settlement offering financial compensation and services to individuals...

Read More
Image of someone with a bullhorn for blog about Effects of poor communication in a healthcare setting

3 min read

Effects of poor communication in a healthcare setting

Communication is the cornerstone of effective healthcare. Every patient visit, every procedure, and every handoff between healthcare providers relies...

Read More
Image of gavel and paperwork for blog about Bridgeway Center data breach settlement could pay victims up to $7,500

2 min read

Bridgeway Center data breach settlement could pay victims up to $7,500

Thousands of Americans affected by a 2024 cyberattack on Bridgeway Center may be eligible for compensation through a class-action settlement offering...

Read More
Image of shield for blog about Safeguarding PHI

1 min read

Safeguarding PHI

Safeguarding protected health information (PHI) ensures patient privacy and compliance with HIPAA, and protects against breaches. It includes best...

Read More
Image of digitalized globe, representing the internet for blog about What is the Internet of Medical Things (IOMT)

3 min read

What is the Internet of Medical Things (IOMT)

The Internet of Medical Things (IoMT) refers to a network of connected medical devices, applications, and systems that communicate data over the...

Read More
Image of lock saying

3 min read

Orthopedics Rhode Island data breach exposes patient information

Orthopedics Rhode Island announced a data breach that compromised sensitive patient information, encompassing personal and medical details. They...

Read More
Image of two people discussing legal matters for blog about HIPAA compliance forms for social workers

2 min read

HIPAA compliance forms for social workers

Social workers must adhere to the Health Insurance Portability and Accountability Act (HIPAA), which mandates the protection of patient information...

Read More
Image of two people in therapy for blog about Must social workers comply with HIPAA regulations?

3 min read

Must social workers comply with HIPAA regulations?

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 generated federal regulations that apply to healthcare professionals and...

Read More
Image of a computer log-in screen for blog about Automatic logout for HIPAA compliance

2 min read

Automatic logout for HIPAA compliance

As part of a broader security strategy, automatic logout helps healthcare providers protect sensitive information, reduce the risk of data breaches,...

Read More
woman holding smartphone with calendar app holding pill packet

3 min read

Viral warning about period-tracking apps raises privacy concerns

Most period-tracking apps are not covered by HIPAA, leaving user health data vulnerable to legal requests.

Read More