Meta logo

2 min read

Meta fined €251 million for GDPR violations

Meta was fined €251 million for failing General Data Protection Regulation (GDPR) requirements in a Facebook data breach affecting 29 million accounts.

Read More
Image of lock on keyboard for blog about Common causes of data breaches

2 min read

Common causes of data breaches

Data breaches can occur for various reasons, often stemming from vulnerabilities in systems, processes, or human error. We’ll go over some of the...

Read More
Image of key for blog about Why covered entities should use encryption–even if it isn’t required

2 min read

Why covered entities should use encryption–even if it isn’t required

In healthcare, protecting patient information is a top priority. Many people think HIPAA requires encryption for electronic protected health...

Read More
Image of hacker for blog about How TTPs help organizations identify and combat cyber threats

2 min read

How TTPs help organizations identify and combat cyber threats

According to the National Institute of Standards and Technology (NIST), Tactics, Techniques, and Procedures (TTPs) represent the behavioral patterns...

Read More
Image of locks for blog about FAQs- Encryption and HIPAA compliance

2 min read

FAQs: Encryption and HIPAA compliance

Encryption converts electronic data into an unreadable format, ensuring its confidentiality and integrity. While not explicitly mandated, HIPAA...

Read More
Image of stethoscope and heart for blog about Title I of the Health Insurance Portability and Accountability Act (HIPAA)

2 min read

Title I of HIPAA

Title I of the Health Insurance Portability and Accountability Act (HIPAA) is focused on Health Care Access, Portability, and Renewability. It...

Read More
Image of blocks representing insurance for blog about What is Title IV under HIPAA?

2 min read

What is Title IV under HIPAA?

Title IV of HIPAA is the Enforcement and Revenue Offsets section, which focuses on ensuring compliance with the act’s provisions regarding health...

Read More
Image of someone typing for blog about What is endpoint protection?

2 min read

What is endpoint protection?

Endpoint protection, also known as endpoint security, is the securing endpoints or entry points of end-user devices such as desktops, laptops,...

Read More
Image of tax calculator for blog about Title III of HIPAA

1 min read

Title III of HIPAA

Title III of HIPAA is the Tax-Related Health provision, which establishes tax-preferred treatment for medical savings accounts (MSAs) and provides...

Read More
woman holding smartphone

2 min read

Sharing anonymized patient stories while maintaining HIPAA compliance

Healthcare organizations can share anonymized patient stories to build trust, educate patients, and reduce stigma, all while complying with HIPAA....

Read More
digital icons in front of medical equipment

2 min read

The 10 biggest health data breaches of 2024

In 2024, approximately 168 million individuals were affected by breaches impacting 500 or more. The tenbiggest were responsible for nearly 137...

Read More
informed consent form on clipboard with stethoscope

2 min read

Informed consent and protecting patient autonomy

Informed consent is more than a procedural formality; it protects patient autonomy on a deeper, almost philosophical level. Informed consent has...

Read More