Image of padlock for article about understanding contingency operations for email

1 min read

Understanding contingency operations for email

Contingency operations refer to military and governmental activities to prepare for, respond to, or recover from unforeseen events or emergencies. These operations allow healthcare organizations to maintain necessary functions like email...

Read More
student on smartphone for post Rethinking student support with psychoeducational text messaging

2 min read

Rethinking student support with psychoeducational text messaging

“Psychoeducation is generally known as the information and resources provided to school staff, families, and students by mental health professionals...

Read More
Image of email icon for blog about Understanding ephemeral messaging

1 min read

Understanding ephemeral messaging

Ephemeral messaging refers to sending digital messages that automatically disappear after a certain period.

Read More
Image of a stack of paper for blog on What are nonrepudiation controls?

1 min read

What are nonrepudiation controls?

Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...

Read More
Image of someone's back facing the viewer for a blog about DDos attacks and their impact on HIPAA compliance

2 min read

DDos attacks and their impact on HIPAA compliance

A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...

Read More
Image of shield for blog about Summary of the CISA FOCAL plan

2 min read

Summary of the CISA FOCAL plan

CISA released the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan on September 16, 2024, to provide...

Read More
Image of someone holding a phone for blog about keeping texts for legal defensibility

2 min read

Keeping texts for legal defensibility

Retaining text messages can protect organizations legally by preserving accurate records of communications in the event of legal disputes, regulatory...

Read More
Image of lock on keyboard for aticle about what is a pass-the-hash attack?

3 min read

What is a pass-the-hash attack?

According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it...

Read More
healthcare worker in protective gear for post Breaking confidentiality during public health concerns

4 min read

Breaking confidentiality during public health concerns

During public health crises, the ethical obligation to maintain confidentiality can come into conflict with the need to protect the wider population...

Read More
shelves of paper medical records for post Why certain hospitals have a higher risk of violating HIPAA

3 min read

Why certain hospitals have a higher risk of violating HIPAA

Hospitals must prevent HIPAA violations using an advanced cybersecurity framework, staff training, and behavioral policies.

Read More
Chinese flag for post Massive data breach linked to China

2 min read

Massive data breach linked to China

New reports have revealed that a data breach of major US telecom firms, including AT&T and Verizon, is linked to Chinese hackers.

Read More
law gavel for post Class action lawsuit filed against Columbus Regional Healthcare System

1 min read

Class action lawsuit filed against Columbus Regional Healthcare System

The North Carolina hospital system is facing a class action lawsuit after a 2023 data breach.

Read More
stack of medical records with stethoscope for post ACLU and NaphCare dispute exposure of inmate health records

3 min read

ACLU and NaphCare dispute exposure of inmate health records

A recent incident has raised concerns over inmate privacy, with the electronic records for over 70 individuals incarcerated in Alaska’s prison...

Read More