1 min read
Las Palmas Del Sol Healthcare faces insider data breach
Las Palmas Del Sol Healthcare in El Paso, Texas, has disclosed an insider data breach involving a former employee's unauthorized access to patient records.
Read More
1 min read
Las Palmas Del Sol Healthcare in El Paso, Texas, has disclosed an insider data breach involving a former employee's unauthorized access to patient records.
Read More
2 min read
Massive HIPAA settlements reveal common missteps in healthcare cybersecurity and offer valuable lessons for protecting sensitive patient data.
2 min read
In 2024, the Department of Health and Human Services' Office for Civil Rights (HHS OCR) reinforced protections against disability-based...
2 min read
While the civil penalties for HIPAA violations often get the spotlight, the law also enforces serious criminal penalties for individuals or entities...
3 min read
This year, the HHS Office for Civil Rights began reinforcing regulations outlined in 42 CFR Part 2, which strengthens the protection of substance use...
1 min read
A class action lawsuit claims Akumin failed to protect patient info before a cyberattack.
3 min read
Integrating artificial intelligence (AI) and machine learning (ML) into cybersecurity solutions has transformed patient care through electronic...
2 min read
Healthcare providers must know when to integrate AI into their workflows to optimize patient care and improve efficiency. Moreover, understanding its...
2 min read
Determining whether a healthcare lawyer is a business associate under HIPAA is context-dependent. The key consideration is whether their services...
2 min read
Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining...
2 min read
Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...
2 min read
Fake hacking is when someone pretends to hack your computer or system to scare you. It’s not the same as real hacking, where someone breaks into your...