Image of someone in a hoodie on a computer for blog about What is a machine-in-the-middle attack?

2 min read

What is a machine-in-the-middle attack?

Machine-in-the-middle attacks, often called "man-in-the-middle" (MitM) attacks, occur when an attacker intercepts communication between two parties without their knowledge. This allows the attacker to eavesdrop on the communication, alter messages,...

Read More
digital lock for post What is network segmentation?

2 min read

What is network segmentation?

Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...

Read More
Image of red key lock for blog about FAQs: Access controls

2 min read

FAQs: Access controls

Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...

Read More
Image of shield for blog about Preparing for HIPAA security updates

2 min read

Preparing for HIPAA security updates

At the recent HIPAA conference, HHS OCR senior advisor for health information privacy, Marissa Gordon Nguyen, announced that the HHS has submitted...

Read More
Image of key for blog about Why is encryption important for HIPAA compliance?

2 min read

Why is encryption important for HIPAA compliance?

Encryption is a powerful tool for securing patient information and meeting HIPAA’s requirements for protecting ePHI. While it may not be strictly...

Read More
Image of shield for article about how the OCR released a ransomware prevention guidance

3 min read

OCR releases ransomware prevention guidance

The U.S. Department of Health and Human Services’ Office for Civil Rights has published a video to help healthcare organizations prevent ransomware...

Read More
change healthcare logo for post Over 100 million impacted by Change Healthcare ransomware attack

2 min read

Over 100 million impacted by Change Healthcare ransomware attack

UnitedHealth has confirmed that the February ransomware attack on Change Healthcare exposed the personal and healthcare data of over 100 million...

Read More
BCHP logo for post Boston Children’s Health Physicians targeted in ransomware attack

2 min read

Boston Children’s Health Physicians targeted in ransomware attack

Boston Children’s Health Physicians (BCHP) fell victim to a ransomware attack involving an IT vendor. The attacker, the BianLian group, is now...

Read More
Image of truck for article about Are delivery truck lines business associates?

2 min read

Are delivery truck lines business associates?

Delivery truck lines help transport goods or documents. They are not considered business associates under HIPAA, as they typically do not handle or...

Read More
package delivery for post Is the United Parcel Service considered a business associate under HIPAA?

2 min read

Is the United Parcel Service considered a business associate under HIPAA?

In its role as a carrier of physical packages containing PHI, UPS is not considered a business associate under HIPAA because it qualifies for the...

Read More
Image of mail delivery truck for blog about What is HIPAA's Conduit Exception

2 min read

What is HIPAA's Conduit Exception

The HIPAA Conduit Exception refers to a specific provision in the HIPAA Privacy Rule that allows certain entities to share protected health...

Read More
Image of locks for blog about Privacy vs confidentiality in healthcare

2 min read

Privacy vs confidentiality in healthcare

Privacy is about a patient's control over their information while confidentiality is the healthcare provider's duty to safeguard that information...

Read More
USPS trucks for post Is the US Postal Service a business associate under HIPAA?

2 min read

Is the US Postal Service a business associate under HIPAA?

The US Postal Service is not a business associate under HIPAA because it does not access or use protected health information. Instead, it serves as a...

Read More