arisa health logo for post Arisa Health faces class action lawsuit following data breach

1 min read

Arisa Health faces class action lawsuit following data breach

On March 18, 2024, Arisa Health experienced a cybersecurity incident that disrupted connectivity to its networks. Following the discovery of the issue, the organization initiated a thorough investigation with external cybersecurity experts.

Read More
lock on keyboard for post Tri-City Healthcare confirms data breach

1 min read

Tri-City Healthcare confirms data breach

Tri-City Medical Center, a San Diego medical center, recently announced a large data breach.

Read More
Image showing email icon for article about Implementing text message filters

4 min read

Implementing text message filters

Implementing text message filters is an important measure for organizations aiming to safeguard their communications, maintain regulatory compliance,...

Read More
HIPAA for law enforcement

3 min read

HIPAA for law enforcement

While healthcare providers can share protected health information (PHI) with law enforcement in certain situations, they must do so while balancing...

Read More
Image of someone completing a survey for blog about Creating secure online forms

4 min read

Creating secure online forms

As people provide sensitive information through various web platforms, it’s up to businesses and organizations to keep this data secure. Whether it's...

Read More
Image of computers connected for blog about How to centralize referral networks through email

1 min read

How to centralize referral networks through email

A single centralized referral network is a tool that allows primary healthcare providers to provide patients with the highest degree of care. These...

Read More
Image of credit card and terminal for blog about HIPAA compliant credit card processing

3 min read

HIPAA compliant credit card processing

HIPAA, as a regulatory framework, imposes strict compliance standards on entities that handle health records. However, credit cards are exempted on...

Read More
Image of wooden blocks for article about What are multi-tiered systems of support?

2 min read

What are multi-tiered systems of support?

MTSS frameworks are rooted in education, creating a structured approach to interventions with students. When this principle is used in other sectors...

Read More
Image of someone typing for article on Are email aliases HIPAA compliant

2 min read

Are email aliases HIPAA compliant

Email aliases can be HIPAA compliant with proper security measures, like encryption, having a business associate agreement (BAA) with the email...

Read More
Image of email icons for blog about What happens when your email provider experiences a data breach

3 min read

What happens when your email provider experiences a breach

Email attacks are responsible for 18.1% of healthcare breaches. When your email provider experiences a data breach involving protected health...

Read More
Image of yellow folder for blog about Developing an emergency response plan for downtime operations

2 min read

Developing an emergency response plan for downtime operations

An effective emergency response plan ensures organizational resilience during unexpected challenges. By proactively preparing for potential...

Read More
Image of boxes for blog about using email to coordinate communication in extreme hoarding cases

3 min read

Using email to coordinate communication in hoarding cases

Hoarding Disorder is characterized by the persistent difficulty in discarding or parting with possessions, leading to an excessive accumulation of...

Read More
Image of triangular warning sign for blog about Malware distribution and defending yourself

4 min read

Malware distribution and defending yourself

Malware distribution refers to the methods and techniques used by cybercriminals to spread malicious software (malware) to victims. Cybercriminals...

Read More