digital lock for post What is network segmentation?

2 min read

What is network segmentation?

Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach helps improve security, performance, and management of the network.

Read More
update symbol over keyboard for post Understanding thread hijacking for ‘account update’ phishing

2 min read

Understanding thread hijacking for ‘account update’ phishing

Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...

Read More
digital security lock for post Landmark Admin data breach exposes personal information of 800,000

1 min read

Landmark Admin data breach exposes personal information of 800,000

In May 2024, hackers breached Landmark Admin’s network, encrypting systems and stealing sensitive information from over 800,000 people.

Read More
physician with digital floating data graphic for post September 2024 healthcare data breach insights

2 min read

September 2024 healthcare data breach insights

According to the Office for Civil Rights (OCR) Breach Portal, healthcare data breaches saw a notable decline in September 2024, with only 34...

Read More
law gavel on cash for post HHS reaches $90K settlement in first Risk Analysis Initiative enforcement

1 min read

HHS reaches $90K settlement in first Risk Analysis Initiative enforcement

The HHS has settled its first enforcement action in the OCR’s Risk Analysis Initiative in a settlement with the Bryan County Ambulance Authority.

Read More
Image of someone using a tap to pay machine for blog about Laredo lawsuit challenges Medicaid eligibility DSH payments

1 min read

Laredo lawsuit challenges Medicaid eligibility DSH payments

Laredo Medical Center (Laredo) is suing Xavier Becerra, the Secretary of the HHS, over a Medicare payment dispute concerning low-income patient care.

Read More
Image of red key lock for blog about FAQs: Access controls

2 min read

FAQs: Access controls

Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...

Read More
Image of data for article about The difference between limited data sets and deidentified information

2 min read

The difference between limited data sets and deidentified information

While related, deidentification and limited data sets are distinct concepts under HIPAA with each serving a specific purpose in the healthcare...

Read More
Image of someone in a hoodie on a computer for blog about What is consent phishing (OAuth Exploits)? 

4 min read

What is consent phishing (OAuth Exploits)? 

OAuth is a consent protocol that relies heavily on user consent, on users making an informed decision to approve or deny access to their data....

Read More
Image of someone tapping an email icon for blog about Is BCC enough to ensure HIPAA compliant group emails?

2 min read

Is BCC enough to ensure HIPAA compliant group emails?

Blind Carbon Copy (BCC) is not enough for HIPAA compliant group emails. While it helps protect recipient privacy by concealing email addresses, it...

Read More
red people icons for post Network breach at Gándara Center exposes 17,000

1 min read

Network breach at Gándara Center exposes 17,000

On October 24, 2024, Gándara Center reported a data security breach that exposed theprotected health information (PHI)of current and former patients.

Read More
FTC logo for post FTC and HIPAA Breach Notification Rules: What's the difference?

3 min read

FTC and HIPAA Breach Notification Rules: What's the difference?

Health data stakeholders must distinguish between the Federal Trade Commission's (FTC) Health Breach Notification Rule and the Health Insurance...

Read More
digital lock for post Cybersecurity trends for 2024 and beyond

2 min read

Cybersecurity trends for 2025 and beyond

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...

Read More