Image of a Nokia phone for blog about Nokia investigates breach after hacker claims to steal source code

2 min read

Nokia investigates breach after hacker claims to steal source code

Nokia, a leader in telecommunications, is investigating a cybersecurity breach after a hacker, known as IntelBroker, claimed to have accessed and is attempting to sell Nokia’s source code.

Read More
blue laptop with floating email icons

3 min read

Healthcare breach roundup: Week of 11/04/24

Healthcare data breaches expose sensitive information of patients and clients. Despite advances in cybersecurity, healthcare organizations remain...

Read More
digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential...

Read More
exterior shot of US White House

3 min read

How Trump 2.0 could transform healthcare policies and privacy

President-elect Donald Trump’s return could bring several changes in US health policy, with reforms across Medicaid, the Affordable Care Act, and...

Read More
Image of tablet, laptop, and phone, for blog about how to handle the threat of lost devices 

2 min read

How to handle the threat of lost devices 

With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...

Read More
medical symbol for post The HHS’ 5 best practices for HIPAA compliance

2 min read

The HHS’ 5 best practices for HIPAA compliance

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, the Department of Health and Human Services...

Read More
Image of lock for blog about Preventing cyberattacks after layoffs

3 min read

Preventing cyberattacks after layoffs

According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...

Read More
Image of file folders for blog about Should business associates provide individuals with an accounting of disclosures?

2 min read

Should business associates provide an accounting of disclosures?

The HIPAA Privacy Rule does not require business associates to provide individuals with an accounting of disclosures. This responsibility falls...

Read More
Image of someone sending a message for blog about Third-party messaging apps and HIPAA compliance

3 min read

Third-party messaging apps and HIPAA compliance

Healthcare organizations love being able to message patients on apps, but these providers need to stay HIPAA compliant and maintain patient trust....

Read More
Image of several electornic devices, like a laptop and phone, for blog about Acceptable use policies (AUP) and HIPAA compliance

3 min read

Acceptable use policies (AUP) and HIPAA compliance

An acceptable use policy (AUP) sets clear guidelines on how healthcare employees should securely handle technology and patient data. It outlines...

Read More
Image of checklist for blog about Preparing for a cyberattack

2 min read

Preparing for a cyberattack

A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...

Read More
Image of surveillance camera for blog about HIPAA and video surveillance 

4 min read

HIPAA and video surveillance

Healthcare organizations have long used video surveillance to enhance security, monitor patient and staff activities, and reduce risks. However,...

Read More
docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More