Learning from U.S. sanctions against Russian ransomware laundering

3 min read

Learning from U.S. sanctions against Russian ransomware laundering

On the 26th of September, the U.S. Treasury made headlines by sanctioning two cryptocurrency exchanges, Cryptex and PM2BTC, for laundering millions of dollars linked to Russian ransomware gangs. These sanctions are part of a broader international...

Read More
Implementing RBAC

2 min read

Implementing RBAC

Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...

Read More
Identifying PHI

4 min read

Identifying PHI

Protected health information (PHI) refers to any information about health status, healthcare provision, or payment for healthcare that can be linked...

Read More
U.S. Treasury sanctions Russian cryptocurrency exchanges for laundering

3 min read

U.S. Treasury sanctions Russian cryptocurrency

The U.S. Treasury has sanctioned Russian cryptocurrency exchanges Cryptex and PM2BTC because of laundering allegations. It’s believed that these...

Read More
Choosing authentication types for healthcare

4 min read

Choosing authentication types for healthcare

Selecting the right authentication types for healthcare systems keeps patient information secure while maintaining ease of access for authorized...

Read More
HIPAA compliance and ambulance service providers

2 min read

HIPAA compliance and ambulance service providers

HIPAA requires ambulance service providers to take significant measures to ensure patient information is protected and handled in compliance with the...

Read More
Who needs HIPAA compliance training

4 min read

Who needs HIPAA compliance training

Any individual or entity that handles protected health information (PHI) is required to follow HIPAA rules and receive training to ensure compliance.

Read More
Patient-initiated electronic communication

2 min read

Patient-initiated electronic communication

Patient-initiated electronic communication refers to how patients can connect with healthcare providers using digital platforms, such as email,...

Read More
Audit control in HIPAA compliance

4 min read

Audit control in HIPAA compliance

Audit controls enable organizations to detect unauthorized access or unusual activity involving protected health information (PHI) or electronic...

Read More
Are group chats HIPAA compliant

4 min read

Are group chats HIPAA compliant

Group chats can be HIPAA compliant, but not all chat platforms are automatically secure enough to meet HIPAA's standards. To be HIPAA compliant,...

Read More
Atrium Health faces data breach

2 min read

Atrium Health faces data breach

On September 13, 2024, Atrium Health confirmed a data breach linked to a phishing attack. The incident has raised concerns about the security of...

Read More
Is sending patients to collections a HIPAA violation?

2 min read

Is sending patients to collections a HIPAA violation?

While sending an account to collections is a standard healthcare practice, healthcare providers must understand how to navigate this process without...

Read More