digital representation of quantum computing

3 min read

The fundamentals of quantum computing

The story of quantum computing is one of human ingenuity and curiosity, from the early 20th-century discovery of quantum mechanics to a future of unimaginable possibility. From the finding of subatomic particles to cutting-edge machines of today,...

Read More
phone with stethoscope

3 min read

What information can hospitals give over the phone?

As healthcare providers, patients, and families understand the complexities of hospital communication, a common question arises: what information can...

Read More
child at doctors office

5 min read

Ensuring HIPAA compliance in small to medium-sized practices

Small to medium-sized practices may face challenges with HIPAA requirements due to limited resources and staffing constraints. They should prioritize...

Read More
digital IP address icons

4 min read

What is DNS cache poisoning?

The domain name system (DNS) translates human-readable domain names into machine-readable IP addresses. However, this system is not immune to...

Read More
digital security shield

2 min read

Developing a HIPAA security program

A HIPAA security program is a comprehensive set of policies, procedures, and technical measures implemented by healthcare organizations to protect...

Read More
Image of different types of data, including health, for blog about What are de-identification forms?

2 min read

What are de-identification forms?

De-identification forms are documents or templates used to ensure that sensitive information, particularly personally identifiable information (PII)...

Read More
Image of police badge for blog about When does the Privacy Rule allow covered entities to disclose PHI to law enforcement? 

2 min read

When does the Privacy Rule let covered entities disclose PHI to law enforcement? 

The HIPAA Privacy Rule permits PHI disclosure to law enforcement without patient authorization in specific situations, like complying with court...

Read More
Image of computer for blog about HIPAA compliant computer disposal 

3 min read

HIPAA compliant computer disposal

The HIPAA privacy rule requires healthcare entities to create and follow policies for safely disposing of protected health information (PHI),...

Read More
Image of someone holding tickets for blog about What is a golden ticket attack?

3 min read

What is a golden ticket attack?

Golden ticket attacks are when criminals infiltrate the Kerberos authentication system. They are a serious cybersecurity threat, especially for...

Read More
Image of tax forms for blog about Understanding Title V of HIPAA

2 min read

Understanding Title V of HIPAA

Title V of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) focuses on revenue offsets to address specific tax-related...

Read More
law gavel on us flag

2 min read

What are the primary forms of preemption?

Preemption is a principle that promotes a uniform legal framework across states, particularly in areas where federal regulation is needed to address...

Read More
ascension logo

1 min read

Ascension cyberattack exposes 5.6 million

On May 8, 2024, healthcare giant Ascension experienced a cyberattack that compromised the protected health information (PHI) of nearly 5.6 million...

Read More
university of southwestern texas exterior building

2 min read

University of Texas Southwestern files 3rd data breach notice of 2024

The medical center has filed another breach to the Department of Health and Human Services (HHS).

Read More