Image of shield for blog about Types and consequences of HIPAA violations

4 min read

Types and consequences of HIPAA violations

Healthcare professionals frequently ask about how HIPAA violations can vary and how they may impact a professional or practice. The answer depends on the type and severity of the violation, with minor infractions sometimes being temporary and severe...

Read More
Image of someone on a computer for blog about Anna Jaques Hospital ransomware attack exposed over 300,000 patient records

1 min read

Anna Jaques Hospital ransomware attack exposes patient records

Hackers leak over 300,000 patient records in Anna Jaques Hospital ransomware attack.

Read More
Image of data flowing from one area to another for blog about What is the Data Transfer Project?

2 min read

What is the Data Transfer Project?

The Data Transfer Project (DTP) is an open-source initiative facilitating data portability between online services. Through data portability, users...

Read More
gloved hand on laptop

1 min read

What are attack surfaces and how do cybercriminals exploit them?

Attack surfaces are all the points where an unauthorized user can access a system and extract data. Cloudflare states, “It is essentially like all...

Read More
laptop and magnifying glass

2 min read

How to prepare for an HHS investigation after a breach

The Office for Civil Rights (OCR) enforces the Privacy and Security Rules in several ways:

Read More
digital concept of cybersecurity blue

2 min read

What is an incident response plan?

An incident response plan (IRP) is a well-structured approach that outlines how an organization prepares for, detects, responds to, and recovers from...

Read More
blue digital security lock

3 min read

Differences between an IDS and IPS

According to a study by Georgia State University, an Intrusion Detection System (IDS) is designed to monitor network traffic or system activities for...

Read More
Image of someone looking at analytics for blog about How healthcare analytics is changing patient care

4 min read

How healthcare analytics is changing patient care

Healthcare analytics is making a real difference in patient care. Instead of focusing on how much care is provided, it’s now about improving results...

Read More
Image of two people shaking hands for blog about Are cybersecurity firms business associates?

2 min read

Are cybersecurity firms business associates?

Cybersecurity firms are not automatically considered business associates under the Health Insurance Portability and Accountability Act (HIPAA)....

Read More
nebraska flag

2 min read

Nebraska becomes first state to sue Change Healthcare

The state’s Attorney General is suing Change Healthcare and two other companies following the massive data breach.

Read More
blue shield

2 min read

What is the difference between IOCs and IOAs?

Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge,...

Read More
keyboard with floating people icons

2 min read

Notification requirements if less than 500 individuals are affected

The Breach Notification Rule requires that covered entities follow an outlined process when protected health information (PHI) is inappropriately...

Read More
artivion logo

1 min read

Supply chains and patients at risk in Artivion breach

Medical device company Artivion disclosed on December 9, 2024, that a ransomware attack disrupted its systems, affecting order and shipping...

Read More