BCHP logo for post Boston Children’s Health Physicians targeted in ransomware attack

2 min read

Boston Children’s Health Physicians targeted in ransomware attack

Boston Children’s Health Physicians (BCHP) fell victim to a ransomware attack involving an IT vendor. The attacker, the BianLian group, is now threatening to release sensitive patient and employee data.

Read More
Image of truck for article about Are delivery truck lines business associates?

2 min read

Are delivery truck lines business associates?

Delivery truck lines help transport goods or documents. They are not considered business associates under HIPAA, as they typically do not handle or...

Read More
package delivery for post Is the United Parcel Service considered a business associate under HIPAA?

2 min read

Is the United Parcel Service considered a business associate under HIPAA?

In its role as a carrier of physical packages containing PHI, UPS is not considered a business associate under HIPAA because it qualifies for the...

Read More
Image of mail delivery truck for blog about What is HIPAA's Conduit Exception

2 min read

What is HIPAA's Conduit Exception

The HIPAA Conduit Exception refers to a specific provision in the HIPAA Privacy Rule that allows certain entities to share protected health...

Read More
Image of locks for blog about Privacy vs confidentiality in healthcare

2 min read

Privacy vs confidentiality in healthcare

Privacy is about a patient's control over their information while confidentiality is the healthcare provider's duty to safeguard that information...

Read More
USPS trucks for post Is the US Postal Service a business associate under HIPAA?

2 min read

Is the US Postal Service a business associate under HIPAA?

The US Postal Service is not a business associate under HIPAA because it does not access or use protected health information. Instead, it serves as a...

Read More
Image of email icon and security icon for blog about Identifying an email phishing attack

4 min read

Identifying an email phishing attack

Phishing attacks have become one of the most common cyber threats today, with hackers continuously refining their techniques to exploit unsuspecting...

Read More
Image of email icon for blog about Retention of emails in healthcare

2 min read

Retention of emails in healthcare

Email retention refers to the policies and practices governing how long emails are stored, archived, or deleted. In the healthcare sector, where...

Read More
Image of emergency sign for article about The role of service feedback in emergency medical services

2 min read

The role of feedback in emergency medical services

Feedback provides insights that enable continuous improvement, allowing individuals or teams to refine their practices, enhance performance, and...

Read More
linus tech tips logo for post Linus Tech Tips X (Twitter) account hacked, again

4 min read

Linus Tech Tips X (Twitter) account hacked, again

Linus Sebastian, founder of Linus Tech Tips, shares his experience of being targeted in a phishing attack that compromised his X (Twitter) account.

Read More
Image showing email icon for article about Implementing text message filters

4 min read

Implementing text message filters

Implementing text message filters is an important measure for organizations aiming to safeguard their communications, maintain regulatory compliance,...

Read More
Image of files under a lock for blog about Breaking confidentiality to meet legal obligations

4 min read

Breaking confidentiality to meet legal obligations

Breaking patient confidentiality can occur in certain situations where legal obligations take precedence. These instances are typically regulated to...

Read More
Image of yellow folder for blog about Developing an emergency response plan for downtime operations

2 min read

Developing an emergency response plan for downtime operations

An effective emergency response plan ensures organizational resilience during unexpected challenges. By proactively preparing for potential...

Read More