Image of someone on a computer for blog about Hacker leaks Cisco DevHub data

2 min read

Hacker leaks Cisco DevHub data

A hacker known as IntelBroker has leaked 2.9 GB of files from Cisco's publicly accessible DevHub platform. However, Cisco insists that its systems were not breached and attributes the exposure to a configuration error.

Read More
Image of stethoscope for blog about Consequences of the Medicare Advantage (MA) plan fraud

2 min read

Consequences of the Medicare Advantage (MA) plan fraud

The U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) issued a Special Fraud Alert addressing serious concerns...

Read More
Image of gift cards for blog about OIG warns against suspect payment schemes in the Medicare Advantage program

3 min read

OIG warns against payment schemes in the Medicare Advantage program

The Office of Inspector General (OIG) has issued a Special Fraud Alert warning of potential fraud and abuse risks in marketing arrangements for...

Read More
Image of gavel and book for blog about What are the “Titles” in HIPAA?

2 min read

What are the “Titles” in HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law designed to protect sensitive patient information and improve...

Read More
Image of two people shaking hands for blog about Are cybersecurity firms business associates?

2 min read

Are cybersecurity firms business associates?

Cybersecurity firms are not automatically considered business associates under the Health Insurance Portability and Accountability Act (HIPAA)....

Read More
Image of someone with a clipboard for blog about Conducting a third-party audit

3 min read

Conducting a third-party audit

Conducting a third-party audit involves evaluating an organization’s processes, systems, or practices to assess compliance with national standards,...

Read More
Image of lock for blog about Federal government pledges improved cyberattack partnerships

3 min read

Federal government pledges improved cyberattack partnerships

The federal government has unveiled a proposed update to the National Cyber Incident Response Plan. The revision aims to enhance public-private...

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More
Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
FBI flyer seeking shooting suspect

2 min read

Suspect arrested in targeted killing of UnitedHealthcare CEO

Luigi Mangione, the suspected gunman in the targeted killing of UnitedHealthcare CEO Brian Thompson, was arrested in Pennsylvania after a five-day...

Read More
Individual in hood for blog about Cyberattack on Anna Jaques Hospital exposes vulnerabilities, affects 316,000 individuals

2 min read

Cyberattack on hospital affects 316,000 people

A cyberattack on Anna Jaques Hospital, identified during the 2023 holiday season, breached the sensitive data of 316,000 individuals.

Read More
Inmediata logo

2 min read

Inmediata breach exposes 1.6M patients' data causing $250K settlement

Inmediata Health Group has agreed to a $250,000 settlement for HIPAA violations. The settlement follows a 2019 data breach that exposed the personal...

Read More
Image of nurse taking notes for blog about What is the difference between

2 min read

What is the difference between use and disclosure of PHI?

The key difference between "use" and "disclosure" of PHI lies in whether the information is shared internally within the same organization (use) or...

Read More