orange digital security lock

3 min read

Documenting a data breach under HIPAA regulations

Documenting a data breach while adhering to HIPAA regulations involves following specific steps to ensure compliance, minimize harm, and demonstrate accountability.

Read More
Image of shield for blog about What to know about the Orthopedics Rhode Island data breach 

3 min read

What to know about the Orthopedics Rhode Island data breach 

On November 6, 2024, Orthopedics Rhode Island, Inc. (“Ortho RI”) reported a data breach involving sensitive patient information. The healthcare...

Read More
Image of lock for blog about What is RSA encryption?

3 min read

What is RSA encryption?

What is RSA encryption? Rivest–Shamir–Adleman (RSA) encryption is an asymmetric cryptographic algorithm that enables secure data transmission. It...

Read More
Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files,...

Read More
blue digital lock

2 min read

AAP hit by ransomware: Attackers demand double payment

A ransomware attack by Embargo has allegedly targeted American Associated Pharmacies (AAP). The attackers claim that AAP paid $1.3 million to regain...

Read More
digital concept of medical communications plan

4 min read

Communication policies that align with HIPAA regulations

Creating and implementing communication policies that align with HIPAA regulations ensures compliance, protects patient privacy, and maintains the...

Read More
law gavel on laptop

2 min read

Thousands could receive up to $5,500 from health system data breach settlement

Cummins Behavioral Health Systems has agreed to a $2.1 million class-action settlement offering financial compensation and services to individuals...

Read More
Image of someone with a bullhorn for blog about Effects of poor communication in a healthcare setting

3 min read

Effects of poor communication in a healthcare setting

Communication is the cornerstone of effective healthcare. Every patient visit, every procedure, and every handoff between healthcare providers relies...

Read More
Image of gavel and paperwork for blog about Bridgeway Center data breach settlement could pay victims up to $7,500

2 min read

Bridgeway Center data breach settlement could pay victims up to $7,500

Thousands of Americans affected by a 2024 cyberattack on Bridgeway Center may be eligible for compensation through a class-action settlement offering...

Read More
Image of shield for blog about Safeguarding PHI

1 min read

Safeguarding PHI

Safeguarding protected health information (PHI) ensures patient privacy and compliance with HIPAA, and protects against breaches. It includes best...

Read More
Image of digitalized globe, representing the internet for blog about What is the Internet of Medical Things (IOMT)

3 min read

What is the Internet of Medical Things (IOMT)

The Internet of Medical Things (IoMT) refers to a network of connected medical devices, applications, and systems that communicate data over the...

Read More
Image of lock saying

3 min read

Orthopedics Rhode Island data breach exposes patient information

Orthopedics Rhode Island announced a data breach that compromised sensitive patient information, encompassing personal and medical details. They...

Read More
Image of two people discussing legal matters for blog about HIPAA compliance forms for social workers

2 min read

HIPAA compliance forms for social workers

Social workers must adhere to the Health Insurance Portability and Accountability Act (HIPAA), which mandates the protection of patient information...

Read More