Image of books for blog about Are educational email campaigns part of marketing?

2 min read

Are educational email campaigns part of marketing?

Yes, educational email campaigns are an integral part of marketing. These campaigns focus on providing valuable information to the audience, building trust, and positioning the sender as a credible authority in their field.

Read More
Image of data to represent AI for blog about HHS issues guidelines to ensure fair and secure use of AI in healthcare

3 min read

HHS issues guidance to ensure fair and secure use of AI in healthcare

The HHS Office for Civil Rights has issued guidance to healthcare entities on responsibly using AI tools, emphasizing compliance with...

Read More
Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems,...

Read More
Image of binder for blog about A guide to developing policies for handling PHI

3 min read

A guide to developing policies for handling PHI

Protected health information (PHI) is among the most sensitive data in healthcare, and safeguarding establishes patient privacy, maintains trust, and...

Read More
hacker on laptop

2 min read

MA & VA firms reach $170K settlement with HHS for ransomware breaches

Elgon Inc. and Virtual Private Network Solutions have agreed to pay $170,000 in fines and implement corrective action plans after investigations...

Read More
Image of file folders for blog about Can you be charged for requesting a copy of your PHI?

1 min read

Can you be charged for requesting a copy of your PHI?

Patients can be charged a fee for requesting a copy of their protected health information (PHI), but the fee must comply with the guidelines set...

Read More
Image of puzzle for blog about HIPAA compliant communication during mergers

2 min read

HIPAA compliant communication during mergers

Healthcare mergers and acquisitions often involve transferring sensitive patient information between entities. Ensuring HIPAA compliance during this...

Read More
Image of someone on a computer for blog about U.S. Army soldier arrested for alleged role in hacking incident

3 min read

U.S. Army soldier arrested for alleged role in hacking incident

A U.S. Army communications specialist was arrested in Texas for allegedly leaking presidential call logs and hacking telecommunications firms as part...

Read More
Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More
Image of two people shaking hands for blog about Mergers and HIPAA

2 min read

Mergers and HIPAA

Mergers in the healthcare industry can significantly impact compliance with the Health Insurance Portability and Accountability Act (HIPAA). While...

Read More
Image of gavel for blog about The difference between civil and criminal HIPAA penalties

2 min read

The difference between civil and criminal HIPAA penalties

While both civil and criminal penalties aim to uphold the integrity of HIPAA, the primary difference lies in intent and enforcement. Civil penalties...

Read More
Image of lock for blog about A guide to responding and reporting data breaches

3 min read

A guide to responding and reporting data breaches

Responding to and reporting a data breach is a responsibility that requires prompt action, transparency, and adherence to regulatory requirements. By...

Read More
Image of lock for blog about FAQs: All things phishing

2 min read

FAQs: All things phishing

Phishing is a cyberattack where criminals attempt to deceive individuals into sharing sensitive information, such as passwords, credit card details,...

Read More