Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021 HIMSS Healthcare Cybersecurity Survey, socially engineered phishing attacks accounted for 45% of...

Read More
Is it against HIPAA to give results over the phone?

2 min read

Is it against HIPAA to give results over the phone?

No, it is not necessarily against HIPAA to give results over the phone. Still, it requires careful adherence to specific guidelines. Healthcare...

Read More
Can HIPAA violations lead to termination?

3 min read

Can HIPAA violations lead to termination?

HIPAA violations can have serious consequences for both healthcare organizations and individual employees. The severity of a violation, along with...

Read More
How HIPAA gives patients control over health information

2 min read

How HIPAA gives patients control over health information

HIPAA gives patients greater control over health information through several provisions. These include the rights to access, consent, privacy,...

Read More
NIST takes a stand against nonsensical password rules

2 min read

NIST takes a stand against nonsensical password rules

The National Institute of Standards and Technology (NIST) is pushing to eliminate outdated password rules in a sweeping overhaul to enhance security...

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More
Learning from U.S. sanctions against Russian ransomware laundering

3 min read

Learning from U.S. sanctions against Russian ransomware laundering

On the 26th of September, the U.S. Treasury made headlines by sanctioning two cryptocurrency exchanges, Cryptex and PM2BTC, for laundering millions...

Read More
Implementing RBAC

2 min read

Implementing RBAC

Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...

Read More
Data leak exposes personal details of over 100 million Americans

1 min read

Data leak exposes personal details of over 100 million Americans

A data leak has exposed the personal and employment information of over 100 million Americans. The breach occurred due to a background check...

Read More
UMC health system forced to divert patients amidst ransomware attack

1 min read

UMC health system forced to divert patients amidst ransomware attack

A ransomware attack forced UMC to divert their patients to other facilities due to large scale IT outages affecting essential services.

Read More
What is TPA in healthcare

4 min read

What is TPA in healthcare

A third-party administrator (TPA) in healthcare is an independent individual or organization responsible for managing administrative tasks for an...

Read More
Delta Health System announces data breach

2 min read

Delta Health System announces data breach

The Missouri-based healthcare system recently provided a notice that the organization faced a data breach.

Read More
Identifying PHI

4 min read

Identifying PHI

Protected health information (PHI) refers to any information about health status, healthcare provision, or payment for healthcare that can be linked...

Read More