Image of data for article about The difference between limited data sets and deidentified information

2 min read

The difference between limited data sets and deidentified information

While related, deidentification and limited data sets are distinct concepts under HIPAA with each serving a specific purpose in the healthcare sector. One major difference is that deidentification is a process that, once completed, ensures data is...

Read More
Image of someone in a hoodie on a computer for blog about What is consent phishing (OAuth Exploits)? 

2 min read

What is consent phishing (OAuth Exploits)? 

Consent phishing, also known as OAuth Exploits, is a form of cyberattack that exploits the truth recipients place on popular applications. By...

Read More
Image of someone tapping an email icon for blog about Is BCC enough to ensure HIPAA compliant group emails?

2 min read

Is BCC enough to ensure HIPAA compliant group emails?

Blind Carbon Copy (BCC) is not enough for HIPAA compliant group emails. While it helps protect recipient privacy by concealing email addresses, it...

Read More
red people icons for post Network breach at Gándara Center exposes 17,000

1 min read

Network breach at Gándara Center exposes 17,000

On October 24, 2024, Gándara Center reported a data security breach that exposed theprotected health information (PHI)of current and former patients.

Read More
FTC logo for post FTC and HIPAA Breach Notification Rules: What's the difference?

3 min read

FTC and HIPAA Breach Notification Rules: What's the difference?

Health data stakeholders must distinguish between the Federal Trade Commission's (FTC) Health Breach Notification Rule and the Health Insurance...

Read More
digital lock for post Cybersecurity trends for 2024 and beyond

2 min read

Cybersecurity trends for 2025 and beyond

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...

Read More
hands over red lock on computer for post HHS Cyber Threat Intelligence announces major threat actors in 2024

2 min read

HHS Cyber Threat Intelligence announces major threat actors in 2024

On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...

Read More
globe with blue digital points for post The risk of AI-driven cyberattacks in healthcare

2 min read

The risk of AI-driven cyberattacks in healthcare

The rapid development of Artificial Intelligence (AI) opens the way for more sophisticated and focused cyberattacks. On October 23, 2024, at the...

Read More
Image of shield for blog about Preparing for HIPAA security updates

2 min read

Preparing for HIPAA security updates

At the recent joint HHS and National Institute of Standards and Technology security conference, HHS OCR senior advisor for health information...

Read More
red digital locks for post Over 161,000 impacted in Long Island Plastic Surgical Group cyberattack

2 min read

Over 161,000 impacted in Long Island Plastic Surgical Group cyberattack

Long Island Plastic Surgical Group, a network of 13 practices in New York, has confirmed that a network breach compromised the protected health...

Read More
texas capitol building for post Texas doctor challenges HHS over reproductive health privacy rule

2 min read

Texas doctor challenges HHS over reproductive health privacy rule

A physician in Texas has initiated a lawsuit against the Department of Health and Human Services (HHS) in an effort to halt enforcement of a recently...

Read More
Image of two people holding hands for blog about What are medical advance directives? 

1 min read

What are medical advance directives?

Medical advance directives allow another, trusted individual to make decisions in the event a person is incapable of making it themselves.

Read More
Individual typing for blog about Microsoft creates fake Azure tenants to combat phishing

2 min read

Microsoft creates fake Azure tenants to combat phishing

Microsoft has adopted an innovative approach to counter phishing attacks, effectively luring cybercriminals into carefully crafted honeypots by...

Read More