equinox logo

2 min read

Ransomware attack on Equinox compromises patient and employee data

New York-based human services provider Equinox disclosed a data security breach from April 29, 2024, impacting over 21,500 individuals. The incident, later attributed to the LockBit3.0 ransomware group, involved the theft and subsequent leak of...

Read More
hacker at computer with red code

2 min read

What is a web shell?

A web shell is a malicious script that cybercriminals can use to execute arbitrary commands on a compromised server. Web shells can lead to data...

Read More
stethoscope on paperwork

1 min read

OCR imposes $100,000 fine on Rio Hondo Community Mental Health Center

The US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) fined Rio Hondo Community Mental Health Center in California...

Read More
Image of shield for blog about CISA focusing on critical infrastructure resilience in November

2 min read

CISA focusing on critical infrastructure resilience in November

November is Critical Infrastructure Security and Resilience Month, and CISA is showing ways to strengthen systems across the U.S.

Read More
Image of doctor taking a blood pressure test for blog about Social media HIPAA violation series: Photo post

2 min read

Social media HIPAA violation series: Photo post

A photo shared from a Tennessee operating room in October 2020 raised concerns about privacy and professionalism, prompting Ballad Health to take...

Read More
Image of phones for blog about Social media HIPAA violations: Lincoln Hospital - Pandemic perspectives

2 min read

Social media HIPAA violations: Nurse shares pandemic perspective

A nurse’s video about working conditions during the COVID-19 pandemic sparked a HIPAA investigation, raising concerns about patient privacy and...

Read More
Image of hands for blog about Collaborative communication during SUD treatment

3 min read

Collaborative communication during SUD treatment

A collaborative Substance Use Disorder (SUD) treatment process provides patients with a higher level of care to heal and recover. To do this, SUD...

Read More
people icons connected to lightbulb

2 min read

Building patient trust through equity-centered designed digital tools

One of the biggest challenges in healthcare today involves mistrust among diverse populations. These challenges are often closely linked to a history...

Read More
Image of warehouse for blog about What we know about the Amazon data leak so far

2 min read

What we know about the Amazon data leak so far

Amazon has confirmed that attackers exposed data from some of its employees, with the perpetrators stating they intend to push data owners to...

Read More
Image of mouse and laptop for blog about What is rate limiting?

3 min read

What is rate limiting?

Rate limiting is a versatile technique employed to regulate the frequency of user or application interactions with a web property. It can protect...

Read More
Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files,...

Read More
Image of lock on keyboard for blog about Hackers face federal charges in billion-record data breach

2 min read

Hackers face federal charges in billion-record data breach

The US government has officially charged two hackers accused of stealing 50 billion customer records from AT&T and other major companies.

Read More
Image of phone and text boxes for blog about HIPAA compliant automated messaging for preventive care reminders

3 min read

HIPAA compliant automated messaging for preventive care reminders

Automated messaging can be used for HIPAA compliant preventive care reminders when the communication is directly related to the patient’s treatment,...

Read More