Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems, data, or networks and use that access to cause harm, either intentionally or unintentionally. These...

Read More
Image of binder for blog about A guide to developing policies for handling PHI

3 min read

A guide to developing policies for handling PHI

Protected health information (PHI) is among the most sensitive data in healthcare, and safeguarding establishes patient privacy, maintains trust, and...

Read More
hacker on laptop

2 min read

MA & VA firms reach $170K settlement with HHS for ransomware breaches

Elgon Inc. and Virtual Private Network Solutions have agreed to pay $170,000 in fines and implement corrective action plans after investigations...

Read More
Image of file folders for blog about Can you be charged for requesting a copy of your PHI?

1 min read

Can you be charged for requesting a copy of your PHI?

Patients can be charged a fee for requesting a copy of their protected health information (PHI), but the fee must comply with the guidelines set...

Read More
Image of puzzle for blog about HIPAA compliant communication during mergers

2 min read

HIPAA compliant communication during mergers

Healthcare mergers and acquisitions often involve transferring sensitive patient information between entities. Ensuring HIPAA compliance during this...

Read More
Image of someone on a computer for blog about U.S. Army soldier arrested for alleged role in hacking incident

3 min read

U.S. Army soldier arrested for alleged role in hacking incident

A U.S. Army communications specialist was arrested in Texas for allegedly leaking presidential call logs and hacking telecommunications firms as part...

Read More
Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More
Image of two people shaking hands for blog about Mergers and HIPAA

2 min read

Mergers and HIPAA

Mergers in the healthcare industry can significantly impact compliance with the Health Insurance Portability and Accountability Act (HIPAA). While...

Read More
Image of gavel for blog about The difference between civil and criminal HIPAA penalties

2 min read

The difference between civil and criminal HIPAA penalties

While both civil and criminal penalties aim to uphold the integrity of HIPAA, the primary difference lies in intent and enforcement. Civil penalties...

Read More
Image of lock for blog about A guide to responding and reporting data breaches

3 min read

A guide to responding and reporting data breaches

Responding to and reporting a data breach is a responsibility that requires prompt action, transparency, and adherence to regulatory requirements. By...

Read More
Image of lock for blog about FAQs: All things phishing

2 min read

FAQs: All things phishing

Phishing is a cyberattack where criminals attempt to deceive individuals into sharing sensitive information, such as passwords, credit card details,...

Read More
floating medical icons

3 min read

Releasing information in healthcare: Who, what, when, where & why

The Health Insurance Portability and Accountability Act (HIPAA) imposes stringent confidentiality regulations on medical professionals. However,...

Read More
Image of individual in handcuffs for blog about Understanding criminal penalties for HIPAA violations

2 min read

Understanding criminal penalties for HIPAA violations

While the civil penalties for HIPAA violations often get the spotlight, the law also enforces serious criminal penalties for individuals or entities...

Read More