hands over red lock on computer for post HHS Cyber Threat Intelligence announces major threat actors in 2024

2 min read

HHS Cyber Threat Intelligence announces major threat actors in 2024

On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including Advanced Persistent Threat (APT) groups and ransomware organizations that continue to target essential...

Read More
globe with blue digital points for post The risk of AI-driven cyberattacks in healthcare

2 min read

The risk of AI-driven cyberattacks in healthcare

The rapid development of Artificial Intelligence (AI) opens the way for more sophisticated and focused cyberattacks. On October 23, 2024, at the...

Read More
Image of shield for blog about Preparing for HIPAA security updates

2 min read

Preparing for HIPAA security updates

At the recent joint HHS and National Institute of Standards and Technology security conference, HHS OCR senior advisor for health information...

Read More
red digital locks for post Over 161,000 impacted in Long Island Plastic Surgical Group cyberattack

2 min read

Over 161,000 impacted in Long Island Plastic Surgical Group cyberattack

Long Island Plastic Surgical Group, a network of 13 practices in New York, has confirmed that a network breach compromised the protected health...

Read More
texas capitol building for post Texas doctor challenges HHS over reproductive health privacy rule

2 min read

Texas doctor challenges HHS over reproductive health privacy rule

A physician in Texas has initiated a lawsuit against the Department of Health and Human Services (HHS) in an effort to halt enforcement of a recently...

Read More
Image of two people holding hands for blog about What are medical advance directives? 

1 min read

What are medical advance directives?

Medical advance directives allow another, trusted individual to make decisions in the event a person is incapable of making it themselves.

Read More
Individual typing for blog about Microsoft creates fake Azure tenants to combat phishing

2 min read

Microsoft creates fake Azure tenants to combat phishing

Microsoft has adopted an innovative approach to counter phishing attacks, effectively luring cybercriminals into carefully crafted honeypots by...

Read More
Image of two rings for article about HIPAA and divorce

3 min read

HIPAA and divorce

The Health Insurance Portability and Accountability Act (HIPAA) ensures the protection of protected health information (PHI) during divorce. It makes...

Read More
Image of key for blog about Why is encryption important for HIPAA compliance?

5 min read

Why is encryption important for HIPAA compliance?

Electronic health records (EHRs), telemedicine, and digital communication platforms have revolutionized patient care, but they’ve also introduced new...

Read More
How to know if you’re a covered entity

3 min read

How to know if you’re a covered entity

HIPAA defines certain entities as covered entities and imposes specific responsibilities to ensure compliance. If you are involved in the healthcare...

Read More
Image of lock for article about when does the minimum necessary standard apply? 

1 min read

When does the minimum necessary standard apply? 

The Minimum Necessary Standard requires activities like billing, administration, and auditing to be limited to the minimum information reasonably...

Read More
Image of two people shaking hands for blog about Incidental PHI exposure and business associate agreements

2 min read

Incidental PHI exposure and business associate agreements

A business associate agreement (BAA) is not required for organizations or individuals, such as janitorial services, whose functions don’t involve...

Read More
Does HIPAA apply to fitness and health clubs?

3 min read

Does HIPAA apply to fitness and health clubs?

Fitness and health clubs are not considered covered entities under HIPAA. However, there are potential exceptions, like a wellness program under a...

Read More