Image of computer desktops.

2 min read

How workstation policies improve security

Workstation policies dictate physical security measures like workstation placement, screen locking when unattended, and proper disposal of hardware. The policies contribute to security by reducing the risk of unauthorized access in a way that...

Read More
Image of shield with keyhole.

2 min read

Xactus LLC reports data breach

Xactus LLC recently disclosed a data breach affecting consumers’ personal information after an unauthorized party gained access to a company email...

Read More
Image of someone typing an email.

3 min read

Understanding modern email thread hijacking

Email thread hijacking has evolved from simple reply-chain spam to a sophisticated attack vector that poses significant risks to healthcare...

Read More
Image of two people talking and looking at paperwork. A gavel is also pictured.

2 min read

Are law firms business associates?

Law firms can be considered business associates under HIPAA if they perform functions or services on behalf of a covered entity that involves the use...

Read More
Image of paper cut out of a kidney, held in someone's palm.

1 min read

Innovative Renal Care reports major data breach

A Tennessee-based network of dialysis centers has disclosed a significant data breach that exposed sensitive patient information, including medical...

Read More
Image of someone typing on a laptop.

4 min read

What to do if you discover a HIPAA violation

Discovering a Health Insurance Portability and Accountability Act (HIPAA) violation in the workplace requires prompt action to prevent further harm...

Read More
research lab

1 min read

Clinical trial database exposes 1.6 million patient records

A massive database containing 1.6 million clinical trial records was found exposed online without password protection, potentially compromising...

Read More
ransomware

1 min read

New ransomware group BlackLock emerges as major 2025 threat

A new ransomware operation has shown explosive growth, with experts warning it could become the most dominant ransomware threat of 2025.

Read More
smaply logo

1 min read

Is Smaply HIPAA compliant? (2025 update)

Based on our research, Smaplyis not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
klaviyo logo

1 min read

Is Klaviyo HIPAA compliant? (2025 update)

Based on our research, Klaviyois not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
cisa logo

2 min read

CISA and FDA warn about vulnerabilities in patient monitoring device

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) recently issued a joint warning...

Read More
digital bill

2 min read

Medusa ransomware group demands $1M from SimonMed Imaging

SimonMed Imaging, Arizona, has confirmed a ransomware attack by the Medusa group. The attackers claim to have stolen 212 GB of protected health...

Read More
whatsapp logo

1 min read

Is WhatsApp HIPAA compliant? (2025 update)

Based on our research, WhatsApp is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More