Image showing email icon for article about Implementing text message filters

4 min read

Implementing text message filters

Implementing text message filters is an important measure for organizations aiming to safeguard their communications, maintain regulatory compliance, and protect sensitive information. By filtering text messages, businesses can prevent unauthorized...

Read More
Image of files under a lock for blog about Breaking confidentiality to meet legal obligations

4 min read

Breaking confidentiality to meet legal obligations

Breaking patient confidentiality can occur in certain situations where legal obligations take precedence. These instances are typically regulated to...

Read More
Image of yellow folder for blog about Developing an emergency response plan for downtime operations

2 min read

Developing an emergency response plan for downtime operations

An effective emergency response plan ensures organizational resilience during unexpected challenges. By proactively preparing for potential...

Read More
Image of triangular warning sign for blog about Malware distribution and defending yourself

4 min read

Malware distribution and defending yourself

Malware distribution refers to the methods and techniques used by cybercriminals to spread malicious software (malware) to victims. Cybercriminals...

Read More
blue digital globe for post Cybersecurity Awareness Month 2024: Secure our world

2 min read

Cybersecurity Awareness Month 2024: Secure our world

October marks Cybersecurity Awareness Month, an annual campaign empowering individuals and organizations to protect themselves from cyber threats....

Read More
Image of multiple locks for blog about Rim Country Health and Rehabilitation suffers data breach

2 min read

Rim Country Health and Rehabilitation suffers data breach

A recent data breach at Rim Country Health and Rehabilitation compromised sensitive patient information, prompting the organization to secure its...

Read More
Image of shield for blog about Michigan Masonic Home notifies individuals after suspicious email activity 

2 min read

Michigan facility notifies individuals of suspicious email activity 

Michigan Masonic Home is notifying individuals of a potential data breach following suspicious activity in an employee email account, although no...

Read More
Image of QR code for blog about How to prevent quishing attacks

3 min read

How to prevent quishing attacks

Quishing attacks use QR codes to trick users into visiting malicious websites. As QR codes become more widespread, the potential for quishing attacks...

Read More
Image showing computer servers communicating for blog about Defining two-way SSL/TLS

3 min read

Defining two-way SSL/TLS

Two-way SSL/TLS (Secure Sockets Layer/Transport Layer Security), also known as mutual authentication, is a security protocol that ensures the client...

Read More
verizon logo for post Verizon faces second major outage in 10 days

3 min read

Verizon faces second major outage in 10 days

Verizon has restored service following a major outage that affected thousands of customers across the U.S., with the FCC investigating the cause.

Read More
Image of shield for blog about Learning from recent email breaches

2 min read

Learning from recent email breaches

In recent months, four HIPAA-covered entities—Southern Bone & Joint Specialists, Connally Memorial Medical Center, Rim Country Health and...

Read More
Image of individual holding a phone for blog about Opting out of receiving text messages about data breaches

3 min read

Opting out of receiving text messages about data breaches

While some patients may prefer other communication methods, healthcare providers are often required by law to notify individuals of a data breach....

Read More
Image of someone typing for blog about Using email to notify patients of a data breach

3 min read

Using email to notify patients of a data breach

Email is an efficient way to notify patients about a data breach due to its speed, scalability, and accessibility. It allows healthcare organizations...

Read More