Image of someone with a clipboard for blog about Conducting a third-party audit

3 min read

Conducting a third-party audit

Conducting a third-party audit involves evaluating an organization’s processes, systems, or practices to assess compliance with national standards, regulations, or best practices.

Read More
Image of lock for blog about Federal government pledges improved cyberattack partnerships

3 min read

Federal government pledges improved cyberattack partnerships

The federal government has unveiled a proposed update to the National Cyber Incident Response Plan. The revision aims to enhance public-private...

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More
Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
FBI flyer seeking shooting suspect

2 min read

Suspect arrested in targeted killing of UnitedHealthcare CEO

Luigi Mangione, the suspected gunman in the targeted killing of UnitedHealthcare CEO Brian Thompson, was arrested in Pennsylvania after a five-day...

Read More
Individual in hood for blog about Cyberattack on Anna Jaques Hospital exposes vulnerabilities, affects 316,000 individuals

2 min read

Cyberattack on hospital affects 316,000 people

A cyberattack on Anna Jaques Hospital, identified during the 2023 holiday season, breached the sensitive data of 316,000 individuals.

Read More
Inmediata logo

2 min read

Inmediata breach exposes 1.6M patients' data causing $250K settlement

Inmediata Health Group has agreed to a $250,000 settlement for HIPAA violations. The settlement follows a 2019 data breach that exposed the personal...

Read More
Image of nurse taking notes for blog about What is the difference between

2 min read

What is the difference between use and disclosure of PHI?

The key difference between "use" and "disclosure" of PHI lies in whether the information is shared internally within the same organization (use) or...

Read More
Image of checkboxes and target for blog about How do organizations monitor HIPAA compliance?

2 min read

How do organizations monitor HIPAA compliance?

Monitoring HIPAA compliance is a continuous process that requires a proactive and systematic approach. From implementing policies to conducting...

Read More
Image of shield for blog about What are HIPAA audit controls?

2 min read

What are HIPAA audit controls?

HIPAA audit controls refer to the mechanisms and policies covered entities and business associates implement to track and monitor access to...

Read More
Image of locked computer for blog about Access control vs Audit control

2 min read

Access controls vs Audit controls

Access control ensures that only authorized users can interact with systems and data, while audit control provides visibility and accountability...

Read More
Image of business meeting for blog about The HIPAA compliant way to engage stakeholders

2 min read

The HIPAA compliant way to engage stakeholders

Engaging stakeholders in a HIPAA compliant manner involves safeguarding protected health information (PHI) while encouraging collaboration among...

Read More
clipboard list

2 min read

How an incidence response plan supports HIPAA compliance

An incident response plan (IRP) supports HIPAA compliance by providing a structured framework to manage security incidents effectively.

Read More