Image of files for blog about Should business associates give individuals access to their PHI?

2 min read

Should business associates give individuals access to their PHI?

Business associates are not required to give individuals direct access to their protected health information (PHI). However, they must assist the covered entity in providing access when an individual requests. The covered entity is ultimately...

Read More
face in digital security blue for post DHS and CISA outline post-quantum security steps for operational technology 

3 min read

DHS and CISA outline post-quantum security steps for operational technology 

The US Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance to help operators...

Read More
Image of a lock on a keyboard for article about Canadian authorities arrest suspected hacker linked to Snowflake data breach

2 min read

Canadian authorities arrest suspected hacker linked to Snowflake data breach

Canadian law enforcement has arrested Alexander Moucka, a suspect in a significant cyberattack that compromised the data of numerous Snowflake...

Read More
donating blood for post Are blood banks bound by HIPAA?

2 min read

Are blood banks bound by HIPAA?

Blood banks are generally not bound by HIPAA, but they adhere to FDA regulations, state privacy laws, and their own confidentiality policies to...

Read More
Image of someone signing a document online for blog about Do electronic BAAs meet HIPAA Privacy Rule requirements?

2 min read

Do electronic BAAs meet HIPAA Privacy Rule requirements?

Electronic business associate agreements (BAAs), signed with an electronic signature, are permissible under the HIPAA Privacy Rule if they meet all...

Read More
Image of lock for blog about What are cybersecurity performance goals (CPGs)?

2 min read

What are cybersecurity performance goals (CPGs)?

Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...

Read More
Image of someone in a hoodie on a computer for blog about What is a machine-in-the-middle attack?

2 min read

What is a machine-in-the-middle attack?

Machine-in-the-middle attacks, often called "man-in-the-middle" (MitM) attacks, occur when an attacker intercepts communication between two parties...

Read More
digital lock for post What is network segmentation?

2 min read

What is network segmentation?

Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...

Read More
Image of red key lock for blog about FAQs: Access controls

2 min read

FAQs: Access controls

Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...

Read More
Image of shield for blog about Preparing for HIPAA security updates

2 min read

Preparing for HIPAA security updates

At the recent joint HHS and National Institute of Standards and Technology security conference, HHS OCR senior advisor for health information...

Read More
Image of key for blog about Why is encryption important for HIPAA compliance?

2 min read

Why is encryption important for HIPAA compliance?

Encryption is a powerful tool for securing patient information and meeting HIPAA’s requirements for protecting ePHI. While it may not be strictly...

Read More
Image of shield for article about how the OCR released a ransomware prevention guidance

3 min read

OCR releases ransomware prevention guidance

The U.S. Department of Health and Human Services’ Office for Civil Rights has published a video to help healthcare organizations prevent ransomware...

Read More
change healthcare logo for post Over 100 million impacted by Change Healthcare ransomware attack

2 min read

Over 100 million impacted by Change Healthcare ransomware attack

UnitedHealth has confirmed that the February ransomware attack on Change Healthcare exposed the personal and healthcare data of over 100 million...

Read More