amergis logo

2 min read

Amergis Healthcare breach impacts 11,000

The Maryland-based healthcare staffing firm has begun sending out breach notification letters.

Read More
broken lock with medical symbol

1 min read

Richmond University Medical Center faces data breach

The Medical Center recently notified the Attorney General of Maine and patients regarding a data breach.

Read More
empty hospital bed

2 min read

Can covered entities share information with family members after a death?

“The Privacy Rule permits a covered entity to disclose protected health information about a decedent to a family member, or other person who was...

Read More
data on laptop screen

2 min read

Using big data for better health outcomes

Converging big data with the Internet of Things (IoT) opens new frontiers for personalized medicine and predictive healthcare, promising improvements...

Read More
Meta logo

2 min read

Meta fined €251 million for GDPR violations

Meta was fined €251 million for failing General Data Protection Regulation (GDPR) requirements in a Facebook data breach affecting 29 million...

Read More
Image of lock on keyboard for blog about Common causes of data breaches

2 min read

Common causes of data breaches

Data breaches can occur for various reasons, often stemming from vulnerabilities in systems, processes, or human error. We’ll go over some of the...

Read More
Image of key for blog about Why covered entities should use encryption–even if it isn’t required

2 min read

Why covered entities should use encryption–even if it isn’t required

In healthcare, protecting patient information is a top priority. Many people think HIPAA requires encryption for electronic protected health...

Read More
Image of hacker for blog about How TTPs help organizations identify and combat cyber threats

2 min read

How TTPs help organizations identify and combat cyber threats

According to the National Institute of Standards and Technology (NIST), Tactics, Techniques, and Procedures (TTPs) represent the behavioral patterns...

Read More
Image of locks for blog about FAQs- Encryption and HIPAA compliance

2 min read

FAQs: Encryption and HIPAA compliance

Encryption converts electronic data into an unreadable format, ensuring its confidentiality and integrity. While not explicitly mandated, HIPAA...

Read More
Image of stethoscope and heart for blog about Title I of the Health Insurance Portability and Accountability Act (HIPAA)

2 min read

Title I of HIPAA

Title I of the Health Insurance Portability and Accountability Act (HIPAA) is focused on Health Care Access, Portability, and Renewability. It...

Read More
Image of blocks representing insurance for blog about What is Title IV under HIPAA?

2 min read

What is Title IV under HIPAA?

Title IV of HIPAA is the Enforcement and Revenue Offsets section, which focuses on ensuring compliance with the act’s provisions regarding health...

Read More
Image of someone typing for blog about What is endpoint protection?

2 min read

What is endpoint protection?

Endpoint protection, also known as endpoint security, is the securing endpoints or entry points of end-user devices such as desktops, laptops,...

Read More