Image of gavel.

1 min read

$7.25 million settlement reached in Berry Dunn data breach lawsuit

Berry, Dunn, McNeil & Parker and Reliable Networks have reached a $7.25 million settlement to resolve claims that they failed to protect consumers from a 2023 data breach. The settlement benefits individuals whose private information was potentially...

Read More
Image of someone typing a password into a computer.

1 min read

What are access controls?

Access controls are a security mechanism that regulates who or what can view, use, or modify resources in a system. They ensure only authorized...

Read More
atdata logo

1 min read

Is AtData HIPAA compliant? (2025 update)

Based on our research, AtData is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
jangomail logo

1 min read

Is JangoMail HIPAA compliant? (2025 update)

Based on our research, JangoMail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
apple log on red background

2 min read

Apple warns of ‘extremely sophisticated attack’ targeting iPhones and iPads

Apple has issued an urgent security update after discovering that some iPhones and iPads have been targeted by a highly sophisticated attack.

Read More
Image of lock

2 min read

SOPs for HIPAA compliant communication

Ensuring HIPAA compliance in communication is a critical responsibility for healthcare organizations, business associates, and any entity handling...

Read More
Image of blue shield with lock in it.

1 min read

What is a security assessment?

A security assessment is a systematic evaluation of an organization's information systems, policies, and infrastructure to identify vulnerabilities,...

Read More
mad mimi logo

1 min read

Is Mad Mimi HIPAA compliant? (2025 update)

Based on our research, Mad Mimi is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of lock

1 min read

Cybercriminals exploit SimpleHelp vulnerabilities for initial access

During the last week of January, cybercriminals exploited vulnerabilities in SimpleHelp remote management software to gain initial access to devices....

Read More
Image of blue shield with a keyhole.

1 min read

What are privilege escalation attacks?

Privilege escalation attacks occur when an attacker exploits a vulnerability, misconfiguration, or security weakness to gain higher levels of access...

Read More
drip logo

1 min read

Is Drip HIPAA compliant? (2025 update)

Based on our research, Drip is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
salesforce logo

2 min read

Is Salesforce Journey Builder HIPAA compliant? (2025 update)

Based on our research, Salesforce Journey Builder is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human...

Read More
microsoft logo

1 min read

Is Microsoft Teams HIPAA compliant? (2025 update)

Based on our research, Microsoft Teams is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More