Image of mail delivery truck for blog about What is HIPAA's Conduit Exception

2 min read

What is HIPAA's Conduit Exception

The HIPAA Conduit Exception refers to a specific provision in the HIPAA Privacy Rule that allows certain entities to share protected health information (PHI) without obtaining patient authorization under certain circumstances.

Read More
Image of locks for blog about Privacy vs confidentiality in healthcare

2 min read

Privacy vs confidentiality in healthcare

Privacy is about a patient's control over their information while confidentiality is the healthcare provider's duty to safeguard that information...

Read More
USPS trucks for post Is the US Postal Service a business associate under HIPAA?

2 min read

Is the US Postal Service a business associate under HIPAA?

The US Postal Service is not a business associate under HIPAA because it does not access or use protected health information. Instead, it serves as a...

Read More
Image of email icon and security icon for blog about Identifying an email phishing attack

4 min read

Identifying an email phishing attack

Phishing attacks have become one of the most common cyber threats today, with hackers continuously refining their techniques to exploit unsuspecting...

Read More
Image of email icon for blog about Retention of emails in healthcare

2 min read

Retention of emails in healthcare

Email retention refers to the policies and practices governing how long emails are stored, archived, or deleted. In the healthcare sector, where...

Read More
Image of emergency sign for article about The role of service feedback in emergency medical services

2 min read

The role of feedback in emergency medical services

Feedback provides insights that enable continuous improvement, allowing individuals or teams to refine their practices, enhance performance, and...

Read More
linus tech tips logo for post Linus Tech Tips X (Twitter) account hacked, again

4 min read

Linus Tech Tips X (Twitter) account hacked, again

Linus Sebastian, founder of Linus Tech Tips, shares his experience of being targeted in a phishing attack that compromised his X (Twitter) account.

Read More
Image showing email icon for article about Implementing text message filters

4 min read

Implementing text message filters

Implementing text message filters is an important measure for organizations aiming to safeguard their communications, maintain regulatory compliance,...

Read More
Image of files under a lock for blog about Breaking confidentiality to meet legal obligations

4 min read

Breaking confidentiality to meet legal obligations

Breaking patient confidentiality can occur in certain situations where legal obligations take precedence. These instances are typically regulated to...

Read More
Image of yellow folder for blog about Developing an emergency response plan for downtime operations

2 min read

Developing an emergency response plan for downtime operations

An effective emergency response plan ensures organizational resilience during unexpected challenges. By proactively preparing for potential...

Read More
Image of triangular warning sign for blog about Malware distribution and defending yourself

4 min read

Malware distribution and defending yourself

Malware distribution refers to the methods and techniques used by cybercriminals to spread malicious software (malware) to victims. Cybercriminals...

Read More
blue digital globe for post Cybersecurity Awareness Month 2024: Secure our world

2 min read

Cybersecurity Awareness Month 2024: Secure our world

October marks Cybersecurity Awareness Month, an annual campaign empowering individuals and organizations to protect themselves from cyber threats....

Read More
Image of multiple locks for blog about Rim Country Health and Rehabilitation suffers data breach

2 min read

Rim Country Health and Rehabilitation suffers data breach

A recent data breach at Rim Country Health and Rehabilitation compromised sensitive patient information, prompting the organization to secure its...

Read More