woman signing papers

2 min read

New HIPAA Rule enhances protections for reproductive health information

Effective December 23, 2024, a new HIPAA Privacy Rule requires healthcare providers, covered entities, and business associates to adopt policies safeguarding reproductive health information. The new Rule prohibits disclosures for investigative...

Read More
Image of gift cards for blog about OIG warns against suspect payment schemes in the Medicare Advantage program

3 min read

OIG warns against payment schemes in the Medicare Advantage program

The Office of Inspector General (OIG) has issued a Special Fraud Alert warning of potential fraud and abuse risks in marketing arrangements for...

Read More
Image of someone touching icons for email and the cloud for blog about How AI and automation are changing the face of HIPAA compliance

2 min read

How AI and automation are changing the face of HIPAA compliance

The advancement of technology, particularly in artificial intelligence (AI) and automation, is challenging traditional approaches to healthcare data...

Read More
Image of paper with data for blog about Why should EHRs be audited? 

2 min read

Why should EHRs be audited? 

Regular audits help identify vulnerabilities in electronic health records (EHRs), allowing organizations to pinpoint improvement areas. Auditing EHR...

Read More
Image of gavel and book for blog about What are the “Titles” in HIPAA?

2 min read

What are the “Titles” in HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law designed to protect sensitive patient information and improve...

Read More
Image of someone tapping a sign that says AI for blog about How AI is revolutionizing email breach detection and response

3 min read

How AI is revolutionizing email breach detection and response

Email-based threats have become one of the most pervasive cybersecurity challenges, affecting 90% of global organizations and causing an estimated...

Read More
hook and digital data

2 min read

Phishing attacks in healthcare: How to protect your organization in 2025

According to a study inBMJ Health Care Informatics, 2-3% of email and internet traffic in healthcare organizations is flagged as suspicious, equating...

Read More
Texas Tech Health Sciences Center logo

2 min read

Massive data breach exposes 1.4M at Texas Tech Health Sciences Center

Texas Tech University Health Sciences Center (TTUHSC) recently confirmed a September ransomware attack, exfiltrating the personal and medical data of...

Read More
connectoncall logo

1 min read

ConnectOnCall breach impacts over 900,000 individuals

The ConnectOnCall data breach occurred between February 16, 2024, and May 12, 2024. The breach exposed the protected health information (PHI) of...

Read More
emergency sign

2 min read

When HIPAA doesn’t apply in emergency care

The Health Insurance Portability and Accountability Act of 1996was created to safeguard patients’ protected health information (PHI). Two decades...

Read More
digital code with zero day text

3 min read

What is a zero-day attack?

A zero-day exploit, also known as a zero-day threat, is an attack that targets a security vulnerability for which no patch or fix is available. The...

Read More
provider touching patient hand

1 min read

The impact of HIPAA violations on patient care

When HIPAA guidelines are violated, it can lead to psychological and emotional consequences, social and interpersonal impacts, erosion of trust in...

Read More
hipaa requirements document

3 min read

What happens when you fail to send a breach notification

The HIPAA Breach Notification Rule ensures that covered entities promptly inform individuals when there is a breach of their Protected Health...

Read More