Image of someone holding a phone for blog about keeping texts for legal defensibility

2 min read

Keeping texts for legal defensibility

Retaining text messages can protect organizations legally by preserving accurate records of communications in the event of legal disputes, regulatory audits, or compliance investigations.

Read More
healthcare worker in protective gear for post Breaking confidentiality during public health concerns

4 min read

Breaking confidentiality during public health concerns

During public health crises, the ethical obligation to maintain confidentiality can come into conflict with the need to protect the wider population...

Read More
stack of medical records with stethoscope for post ACLU and NaphCare dispute exposure of inmate health records

3 min read

ACLU and NaphCare dispute exposure of inmate health records

A recent incident has raised concerns over inmate privacy, with the electronic records for over 70 individuals incarcerated in Alaska’s prison...

Read More
US capitol building for post US Senators propose stricter cybersecurity for healthcare entities

3 min read

US Senators propose stricter cybersecurity for healthcare entities

In response to the growing threat of cyberattacks on the healthcare sector, two Democratic senators have proposed a new bill to strengthen...

Read More
Image of phone and laptop for blog about Understanding contextual multi-factor authentication (MFA)

3 min read

Understanding contextual multi-factor authentication (MFA)

Contextual multi-factor authentication (MFA), also known as adaptive authentication, is an advanced security approach that adjusts authentication...

Read More
Image of a scale for a blog about the balancing act in healthcare

3 min read

The balancing act in healthcare

The "Balancing Act" is a metaphor used to describe the process of managing competing demands, priorities, or responsibilities to maintain equilibrium...

Read More
An image of a gavel and a piece of paper with words for a blog about the importance of legal counsel on HIPAA compliance teams

2 min read

The importance of legal counsel on HIPAA compliance teams

Legal counsel in the compliance team is key to understanding HIPAA regulations and addressing potential legal issues. The advisor guarantees that all...

Read More
t-mobile logo for post U.S. and T-Mobile agree to a $31.5 million data breach settlement

2 min read

U.S. and T-Mobile agree to a $31.5 million data breach settlement

T-Mobile has agreed to a $31.5 million settlement with the FCC in response to data breaches that affected millions of U.S. consumers over a...

Read More
An image of a person texting for a blog about can you text PHI internally?

2 min read

Can you text PHI internally?

Texting protected health information (PHI) internally within a healthcare organization is generally discouraged unless it complies with HIPAA...

Read More
Image of shield for blog on top identity threats facing healthcare organizations

4 min read

Top identity threats facing healthcare organizations

Identity has become a major target for cybercriminals, affecting organizations of all sizes, and particularly healthcare. High-profile incidents like...

Read More
Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021...

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More
Learning from U.S. sanctions against Russian ransomware laundering

3 min read

Learning from U.S. sanctions against Russian ransomware laundering

On the 26th of September, the U.S. Treasury made headlines by sanctioning two cryptocurrency exchanges, Cryptex and PM2BTC, for laundering millions...

Read More