Image of stethoscope over clipboard.

2 min read

How to know if your services are covered by HIPAA

To determine if your services are covered by HIPAA, you need to identify if your organization falls under the category of a "covered entity" or if you handle protected health information (PHI) as part of your business operations.

Read More
Image of gavel.

1 min read

$7.25 million settlement reached in Berry Dunn data breach lawsuit

Berry, Dunn, McNeil & Parker and Reliable Networks have reached a $7.25 million settlement to resolve claims that they failed to protect consumers...

Read More
Image of someone typing a password into a computer.

1 min read

What are access controls?

Access controls are a security mechanism that regulates who or what can view, use, or modify resources in a system. They ensure only authorized...

Read More
atdata logo

1 min read

Is AtData HIPAA compliant? (2025 update)

Based on our research, AtData is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
jangomail logo

1 min read

Is JangoMail HIPAA compliant? (2025 update)

Based on our research, JangoMail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
apple log on red background

2 min read

Apple warns of ‘extremely sophisticated attack’ targeting iPhones and iPads

Apple has issued an urgent security update after discovering that some iPhones and iPads have been targeted by a highly sophisticated attack.

Read More
Image of lock

2 min read

SOPs for HIPAA compliant communication

Ensuring HIPAA compliance in communication is a critical responsibility for healthcare organizations, business associates, and any entity handling...

Read More
Image of blue shield with lock in it.

1 min read

What is a security assessment?

A security assessment is a systematic evaluation of an organization's information systems, policies, and infrastructure to identify vulnerabilities,...

Read More
mad mimi logo

1 min read

Is Mad Mimi HIPAA compliant? (2025 update)

Based on our research, Mad Mimi is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of lock

1 min read

Cybercriminals exploit SimpleHelp vulnerabilities for initial access

During the last week of January, cybercriminals exploited vulnerabilities in SimpleHelp remote management software to gain initial access to devices....

Read More
Image of blue shield with a keyhole.

1 min read

What are privilege escalation attacks?

Privilege escalation attacks occur when an attacker exploits a vulnerability, misconfiguration, or security weakness to gain higher levels of access...

Read More
drip logo

1 min read

Is Drip HIPAA compliant? (2025 update)

Based on our research, Drip is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
salesforce logo

2 min read

Is Salesforce Journey Builder HIPAA compliant? (2025 update)

Based on our research, Salesforce Journey Builder is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human...

Read More