2 min read
How to prepare for an HHS investigation after a breach
The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:
Read More
2 min read
The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:
Read More
2 min read
An incident response plan (IRP) is a well-structured approach that outlines how an organization prepares for, detects, responds to, and recovers from...
3 min read
According to a study by Georgia State University, an Intrusion Detection System (IDS) is designed to monitor network traffic or system activities for...
4 min read
Healthcare analytics is making a real difference in patient care. Instead of focusing on how much care is provided, it’s now about improving results...
2 min read
Cybersecurity firms are not automatically considered business associates under the Health Insurance Portability and Accountability Act (HIPAA)....
2 min read
The state’s Attorney General is suing Change Healthcare and two other companies following the massive data breach.
2 min read
Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge,...
2 min read
The Breach Notification Rule requires that covered entities follow an outlined process when protected health information (PHI) is inappropriately...
1 min read
Medical device company Artivion disclosed on December 9, 2024, that a ransomware attack disrupted its systems, affecting order and shipping...
3 min read
Conducting a third-party audit involves evaluating an organization’s processes, systems, or practices to assess compliance with national standards,...
3 min read
The federal government has unveiled a proposed update to the National Cyber Incident Response Plan. The revision aims to enhance public-private...
2 min read
Romania faces election turmoil after over 85,000 cyberattacks and a TikTok disinformation campaign linked to Russia disrupted presidential voting.
3 min read
With over 328 million terabytes of data generated daily, cyber threats are rising as criminals seek to exploit this valuable resource. Today, secure...