Image of two people looking at data for blog about Internal HIPAA audits

2 min read

Internal HIPAA audits

Internal HIPAA audits are a vital step toward ensuring the security and privacy of PHI. They help organizations remain compliant and build a culture of accountability. By addressing potential issues early and staying informed of HIPAA updates,...

Read More
digital locks on red blocks

3 min read

Types of data breaches

What is a data breach? Data breaches occur when sensitive, confidential, or protected information is accessed or disclosed without proper...

Read More
Image of blocks for blog about Scalability and patient engagement

2 min read

Scalability and patient engagement

Enhancing scalability in patient engagement facilitates efficient, consistent, and personalized care. Making sure your organization is scaling up as...

Read More
atrium health logo

2 min read

Atrium Health notifies HHS of data breach impacting over 585,000

Atrium Health has disclosed a data breach affecting over 585,000 individuals, linked to third-party tracking technologies on its patient portal.

Read More
Image of congress room for blog about What providers must know about the new cybersecurity Senate Bill

2 min read

What providers should know about the new cybersecurity Senate Bill

The U.S. Senate has introduced the Health Care Cybersecurity and Resiliency Act of 2024, a bipartisan effort aimed at enhancing cybersecurity in the...

Read More
provider and patient hands

3 min read

HIPAA compliant communication in patient-centered care

Patient-centered care is a comprehensive care model that focuses on the patient’s symptoms, medical history, emotional, social, and financial factors...

Read More
Image of camera for blog about Can healthcare providers allow media in treatment areas?

2 min read

Can healthcare providers allow media in treatment areas?

Healthcare providers cannot invite or arrange for members of the media, including film crews, to enter treatment areas of their facilities without...

Read More
Image of someone in a hospital bed for blog about Caring for incapacitated patients

2 min read

Caring for incapacitated patients

HIPAA mandates the protection of patient health information (PHI), and while incapacitated patients may not be able to provide consent themselves,...

Read More
Image of someone sending an email for blog about Hallmarks of phishing attempts

2 min read

Hallmarks of phishing attempts

Phishing attacks are growing more sophisticated, but recognizing their common characteristics can keep you ahead of the curve. According to CISA...

Read More
Image of warning sign for blog about Black Basta Ransomware group targets Microsoft Teams for social engineering attacks

2 min read

Black Basta Ransomware group targets Microsoft Teams for attacks

The Black Basta ransomware group has escalated its cyberattacks by using Microsoft Teams to impersonate IT personnel. The tactic tricks employees...

Read More
apple icon on laptop

3 min read

The latest scam: ‘Your Apple ID is suspended’

What happened A new phishing scam is targeting Apple users by sending fake emails claiming that the recipient's Apple ID, now referred to as "Apple...

Read More
Image of shield for blog about Quantum computing breakthrough threatens encryption systems

2 min read

Quantum computing breakthrough threatens encryption systems

A recent study conducted by Shanghai University indicates that D-Wave's quantum annealing technology could compromise encryption systems such as RSA...

Read More
blue digital lock

5 min read

HIPAA encryption requirements

The Health Insurance Portability and Accountability Act (HIPAA) establishes stringent standards for safeguarding protected health information (PHI),...

Read More