Image of devices including computer, tablet, and laptop.

1 min read

BYOD best practices in healthcare

The rise of bring-your-own-device (BYOD) policies in healthcare settings creates unique security challenges for protecting patient information. With 85% of healthcare workers using personal devices for work-related tasks, according to a recent...

Read More
Image of someone typing green code on a laptop.

2 min read

What is remote code execution?

Remote code execution (RCE) has emerged as a security concern in healthcare, recently experienced through the Contec CMS8000 patient monitor...

Read More
Image of blue shield with lock in it.

1 min read

What is a security assessment?

A security assessment is a systematic evaluation of an organization's information systems, policies, and infrastructure to identify vulnerabilities,...

Read More
Image of three telephones and their wires.

2 min read

Inclusive language in healthcare communications

Inclusive language is a large factor in creating a welcoming and respectful environment for patients from diverse backgrounds, including gender...

Read More
Image of colorful wooden figures.

2 min read

What is DEI in healthcare?

Diversity, equity, and inclusion (DEI) comprise policies and practices that promote full participation and fair treatment for all individuals. DEI...

Read More
emma logo

1 min read

Is Emma HIPAA compliant? (2025 update)

Based on our research, Emma is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
platform.sh logo

2 min read

Is Platform.sh HIPAA compliant? (2025 update)

Based on our research, Platform.sh is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
caduceus

3 min read

How professional associations shape healthcare and ethics

A study by BMJ Journals, Associations, unions and everything in between: contextualising the role of representative health worker organisations in...

Read More
blue digital checkmark

2 min read

HIPAA security officers vs. privacy officers

According to Bradley University, "While there is a fair amount of conceptual overlap in privacy and security, HIPAA treats them as two very distinct...

Read More
eye clinic

1 min read

Asheville Eye Associates announces data breach impacting nearly 200K

What happened Asheville Eye Associates recently began notifying individuals who were impacted by a cybersecurity incident.

Read More
california state capitol

1 min read

California Department of Corrections reach $1.8M settlement

The breach impacted staff, visitors, and others, resulting in a large class action lawsuit.

Read More
contactpigeon logo

1 min read

Is ContactPigeon HIPAA compliant? (2025 update)

Based on our research, ContactPigeon is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
bluehost logo

1 min read

Does Bluehost offer HIPAA compliant web hosting? (2025 update)

Based on our research, Bluehost is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More