Investigation reveals Medicare fraud more prevalent than ever

2 min read

Investigation reveals Medicare fraud more prevalent than ever

CBS journalists recently investigated the prevalence of Medicare fraud and its relationship to rising data breaches.

Read More
digital human outline for post HHS identifies healthcare’s most urgent cyber threats

2 min read

HHS identifies healthcare’s most urgent cyber threats

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, the HHS urged healthcare organizations to...

Read More
package delivery for post Is the United Parcel Service considered a business associate under HIPAA?

2 min read

Is the United Parcel Service considered a business associate under HIPAA?

In its role as a carrier of physical packages containing PHI, UPS is not considered a business associate under HIPAA because it qualifies for the...

Read More
Image of security shield for article about MDR and its benefits

3 min read

MDR and its benefits

Healthcare organizations have faced an unprecedented surge in intrusion attempts, with a 50% increase in attacks compared to the previous year....

Read More
Two individuals shaking hands for blog about Understanding covered entities’ responsibilities toward business associates under HIPAA

3 min read

Covered entities and business associate requirements under HIPAA

A covered entity is not liable for the actions of its business associates nor required to monitor their actions under HIPAA. While covered entities...

Read More
Image of two people talking for blog about What are psychiatric advance directives

1 min read

What are psychiatric advance directives

In some cases, mental health disorders can leave patients in the unfortunate position of no longer being capable of making their own decisions for...

Read More
digital people icons over a keyboard for post Avoiding a HIPAA breach when emailing patient payment information

3 min read

Avoiding a HIPAA breach when emailing patient payment information

Healthcare organizations can avoid a HIPAA breach when emailing patient payment information by using encrypted email services, securing business...

Read More
business icons for post The risks of not having a BAA with your business associates

3 min read

The risks of not having a BAA with your business associates

The risks of not having a business associate agreement (BAA) with your business associates include significant HIPAA violations, which can result in...

Read More
Image of paperwork for blog about The difference between consent and authorization

3 min read

The difference between consent and authorization

Under the HIPAA Privacy Rule, consent is a voluntary, flexible process that allows healthcare providers to use or disclose protected health...

Read More
Image of individual on computer for blog about Cisco investigates potential data breach after hacker claims attack

2 min read

Cisco investigates potential data breach after hacker claims attack

Cisco is investigating reports of a potential data breach, with sensitive information allegedly being put up for sale on a well-known hacking forum.

Read More
Image of mail delivery truck for blog about What is HIPAA's Conduit Exception

2 min read

What is HIPAA's Conduit Exception

The HIPAA Conduit Exception refers to a specific provision in the HIPAA Privacy Rule that allows certain entities to share protected health...

Read More
digital lock with medical symbol for post How HIPAA defines confidentiality, integrity, and availability of ePHI

3 min read

How HIPAA defines confidentiality, integrity, and availability of ePHI

HIPAA defines confidentiality as the protection of patient data from unauthorized disclosure. Integrity involves safeguarding data accuracy and...

Read More