floating security icons over laptop with phone

3 min read

Email user authentication and HIPAA best practices

Email user authentication verifies the identity of users as authorized to receive or send an email before a message is delivered. Owing to identity confirmation, hackers won’t be able to use malicious acts to trick people into giving up sensitive...

Read More
amazon chime logo

1 min read

Is Amazon Chime HIPAA compliant? (2025 update)

Based on our research, Amazon Chime is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
instavoice logo

1 min read

Is InstaVoice HIPAA compliant? (2025 update)

Based on our research, InstaVoice is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of book with pages open.

2 min read

How natural language processing works

Natural language processing is a portion of artificial intelligence that allows computers to understand and interpret human language. With...

Read More
Image of blue shield with keyhole.

1 min read

Over 70K records exposed in recent Arizona data breach

Around December 13, 2024, Primary Health-SMMPP and U.S. Healthworks-SMMPP, two HIPAA business associates based in Arizona, detected unusual activity...

Read More
Image of light blue shield with keyhole in it.

2 min read

Orange group hit by data breach, leads to data leak

Orange Group confirms a cyberattack on its Romanian operations after a hacker linked to the HellCat ransomware group leaked stolen company documents...

Read More
blue digital security lock

5 min read

Security requirements for HIPAA-covered transactions

In What the HIPAA Transactions and Code Set Standards Will Mean for Your Practice, David C. Kibbe states, “The data in the transactions you will be...

Read More
demandforce homepage

1 min read

Is Demandforce HIPAA compliant? (2025 update)

Based on our research, Demandforce is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
universtiy of washington logo

2 min read

Fred Hutchinson and University of WA settle data breach lawsuit for $11.5M

Fred Hutchinson Cancer Center and the University of Washington have agreed to a $11.5 million settlement and committed $13.5 million to cybersecurity...

Read More
google keep logo

1 min read

Can I use Google Keep and be HIPAA compliant? (2025 update)

Based on our research, Google Keep is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
Image of individual signing an intake form.

2 min read

The use of natural language processing in interpreting intake forms

The use of Natural Language Processing (NLP) in interpreting intake forms enables automated extraction and analysis of data, streamlining the process...

Read More
Image of handshake.

1 min read

The value of vendor consolidation in healthcare

Reducing the number of vendors is a way for healthcare organizations to improve the efficiency of operations. Operationally, vendor consolidation...

Read More
Image of files in a cabinet.

2 min read

Healthcare providers' guide to HIPAA information access requirements

45 CFR § 164.524 establishes regulations that give individuals the right to access, inspect, and obtain copies of their protected health information...

Read More