Image of a checklist for blog about What is a post-breach risk assessment?

2 min read

What is a post-breach risk assessment?

A post-breach risk assessment is a structured evaluation conducted after a data breach or cybersecurity incident to determine the scope, impact, and severity of the event. It is part of an organization’s incident response process, designed to assess...

Read More
Image of memory card in computer for blog about Quantum computing in healthcare

3 min read

Quantum computing in healthcare

Quantum computing in healthcare has the potential to revolutionize various aspects of the industry, particularly in areas such as drug discovery,...

Read More
Image of lock for for blog about Implementing cyber hygiene practices in your organization

2 min read

Implementing cyber hygiene practices in your organization

The healthcare industry has seen a gradual increase in data breaches “involving the loss of 500 or more records” from 2009 to 2024. These breaches...

Read More
Change healthcare logo

2 min read

9 months after the attack, Change Healthcare restores its clearinghouse

Nine months after a ransomware attack by ALPHV/BlackCat crippled its operations and exposed data on 100 million people, Change Healthcare has...

Read More
orange digital security lock

3 min read

Documenting a data breach under HIPAA regulations

Documenting a data breach while adhering to HIPAA regulations involves following specific steps to ensure compliance, minimize harm, and demonstrate...

Read More
Image of shield for blog about What to know about the Orthopedics Rhode Island data breach 

3 min read

What to know about the Orthopedics Rhode Island data breach 

On November 6, 2024, Orthopedics Rhode Island, Inc. (“Ortho RI”) reported a data breach involving sensitive patient information. The healthcare...

Read More
Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files,...

Read More
blue digital lock

2 min read

AAP hit by ransomware: Attackers demand double payment

A ransomware attack by Embargo has allegedly targeted American Associated Pharmacies (AAP). The attackers claim that AAP paid $1.3 million to regain...

Read More
digital concept of medical communications plan

4 min read

Communication policies that align with HIPAA regulations

Creating and implementing communication policies that align with HIPAA regulations ensures compliance, protects patient privacy, and maintains the...

Read More
law gavel on laptop

2 min read

Thousands could receive up to $5,500 from health system data breach settlement

Cummins Behavioral Health Systems has agreed to a $2.1 million class-action settlement offering financial compensation and services to individuals...

Read More
Image of someone with a bullhorn for blog about Effects of poor communication in a healthcare setting

3 min read

Effects of poor communication in a healthcare setting

Communication is the cornerstone of effective healthcare. Every patient visit, every procedure, and every handoff between healthcare providers relies...

Read More
Image of gavel and paperwork for blog about Bridgeway Center data breach settlement could pay victims up to $7,500

2 min read

Bridgeway Center data breach settlement could pay victims up to $7,500

Thousands of Americans affected by a 2024 cyberattack on Bridgeway Center may be eligible for compensation through a class-action settlement offering...

Read More
Image of shield for blog about Safeguarding PHI

1 min read

Safeguarding PHI

Safeguarding protected health information (PHI) ensures patient privacy and compliance with HIPAA, and protects against breaches. It includes best...

Read More