Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021 HIMSS Healthcare Cybersecurity Survey, socially engineered phishing attacks accounted for 45% of...

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More
Learning from U.S. sanctions against Russian ransomware laundering

3 min read

Learning from U.S. sanctions against Russian ransomware laundering

On the 26th of September, the U.S. Treasury made headlines by sanctioning two cryptocurrency exchanges, Cryptex and PM2BTC, for laundering millions...

Read More
Implementing RBAC

2 min read

Implementing RBAC

Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...

Read More
Identifying PHI

4 min read

Identifying PHI

Protected health information (PHI) refers to any information about health status, healthcare provision, or payment for healthcare that can be linked...

Read More
U.S. Treasury sanctions Russian cryptocurrency exchanges for laundering

3 min read

U.S. Treasury sanctions Russian cryptocurrency

The U.S. Treasury has sanctioned Russian cryptocurrency exchanges Cryptex and PM2BTC because of laundering allegations. It’s believed that these...

Read More
Choosing authentication types for healthcare

4 min read

Choosing authentication types for healthcare

Selecting the right authentication types for healthcare systems keeps patient information secure while maintaining ease of access for authorized...

Read More
HIPAA compliance and ambulance service providers

2 min read

HIPAA compliance and ambulance service providers

HIPAA requires ambulance service providers to take significant measures to ensure patient information is protected and handled in compliance with the...

Read More
Who needs HIPAA compliance training

4 min read

Who needs HIPAA compliance training

Any individual or entity that handles protected health information (PHI) is required to follow HIPAA rules and receive training to ensure compliance.

Read More
Patient-initiated electronic communication

2 min read

Patient-initiated electronic communication

Patient-initiated electronic communication refers to how patients can connect with healthcare providers using digital platforms, such as email,...

Read More
Audit control in HIPAA compliance

4 min read

Audit control in HIPAA compliance

Audit controls enable organizations to detect unauthorized access or unusual activity involving protected health information (PHI) or electronic...

Read More
Are group chats HIPAA compliant

4 min read

Are group chats HIPAA compliant

Group chats can be HIPAA compliant, but not all chat platforms are automatically secure enough to meet HIPAA's standards. To be HIPAA compliant,...

Read More