Image of congress room for blog about What providers must know about the new cybersecurity Senate Bill

2 min read

What providers should know about the new cybersecurity Senate Bill

The U.S. Senate has introduced the Health Care Cybersecurity and Resiliency Act of 2024, a bipartisan effort aimed at enhancing cybersecurity in the healthcare sector. It calls for updates to HIPAA regulations and improving coordination between...

Read More
provider and patient hands

3 min read

HIPAA compliant communication in patient-centered care

Patient-centered care is a comprehensive care model that focuses on the patient’s symptoms, medical history, emotional, social, and financial factors...

Read More
Image of camera for blog about Can healthcare providers allow media in treatment areas?

2 min read

Can healthcare providers allow media in treatment areas?

Healthcare providers cannot invite or arrange for members of the media, including film crews, to enter treatment areas of their facilities without...

Read More
Image of someone in a hospital bed for blog about Caring for incapacitated patients

2 min read

Caring for incapacitated patients

HIPAA mandates the protection of patient health information (PHI), and while incapacitated patients may not be able to provide consent themselves,...

Read More
Image of someone sending an email for blog about Hallmarks of phishing attempts

2 min read

Hallmarks of phishing attempts

Phishing attacks are growing more sophisticated, but recognizing their common characteristics can keep you ahead of the curve. According to CISA...

Read More
Image of warning sign for blog about Black Basta Ransomware group targets Microsoft Teams for social engineering attacks

2 min read

Black Basta Ransomware group targets Microsoft Teams for attacks

The Black Basta ransomware group has escalated its cyberattacks by using Microsoft Teams to impersonate IT personnel. The tactic tricks employees...

Read More
apple icon on laptop

3 min read

The latest scam: ‘Your Apple ID is suspended’

What happened A new phishing scam is targeting Apple users by sending fake emails claiming that the recipient's Apple ID, now referred to as "Apple...

Read More
Image of shield for blog about Quantum computing breakthrough threatens encryption systems

2 min read

Quantum computing breakthrough threatens encryption systems

A recent study conducted by Shanghai University indicates that D-Wave's quantum annealing technology could compromise encryption systems such as RSA...

Read More
blue digital lock

5 min read

HIPAA encryption requirements

The Health Insurance Portability and Accountability Act (HIPAA) establishes stringent standards for safeguarding protected health information (PHI),...

Read More
Image of a checklist for blog about What is a post-breach risk assessment?

2 min read

What is a post-breach risk assessment?

A post-breach risk assessment is a structured evaluation conducted after a data breach or cybersecurity incident to determine the scope, impact, and...

Read More
Image of memory card in computer for blog about Quantum computing in healthcare

3 min read

Quantum computing in healthcare

Quantum computing in healthcare has the potential to revolutionize various aspects of the industry, particularly in areas such as drug discovery,...

Read More
Image of lock for for blog about Implementing cyber hygiene practices in your organization

2 min read

Implementing cyber hygiene practices in your organization

The healthcare industry has seen a gradual increase in data breaches “involving the loss of 500 or more records” from 2009 to 2024. These breaches...

Read More
Change healthcare logo

2 min read

9 months after the attack, Change Healthcare restores its clearinghouse

Nine months after a ransomware attack by ALPHV/BlackCat crippled its operations and exposed data on 100 million people, Change Healthcare has...

Read More