Image of individual on a computer for blog about Learning from the CMS data breach 

3 min read

Learning from the CMS data breach 

A recent investigation has revealed that the data breach at Wisconsin Physicians Service (WPS) and the Centers for Medicare & Medicaid Services (CMS) has compromised the information of 3.1 million individuals.

Read More
Image of voice waves for blog about HIPAA compliant VoIP services

4 min read

HIPAA compliant VoIP services

HIPAA compliant Voice over Internet Protocol (VoIP) systems are designed to store and transmit PHI while mitigating data privacy and security risks....

Read More
microsoft logo for post Microsoft report uncovers cybersecurity threat to critical U.S. sectors

2 min read

Microsoft report uncovers cybersecurity threat to critical U.S. sectors

A recently released report by Microsoft shows a cybersecurity group seemingly posing a risk to healthcare organizations.

Read More
meta logo for post Meta hit with €91 million fine for lax password safety

2 min read

Meta hit with €91 million fine for lax password safety

The General Data Protection Regulation (GDPR) has given a hefty €91 million fine to Meta, the parent company of social media giants Facebook and...

Read More
man on tablet for post The human factor in healthcare cybersecurity

2 min read

The human factor in healthcare cybersecurity

One of the most insidious threats facing health care today is the rise of social engineering attacks that take advantage of human vulnerabilities....

Read More
Image of someone at a computer for blog about Baptist Health suffers data breach  

1 min read

Baptist Health suffers data breach

Baptist Health Medical Center has begun notifying affected patients following unauthorized access to their IT environment.

Read More
Image of someone holding a clock for blog about Granular retention schedules and HIPAA 

2 min read

Granular retention schedules and HIPAA

Granular retention schedules allow healthcare organizations to precisely classify and manage emails based on their content. The approach reduces the...

Read More
Image of padlock for article about understanding contingency operations for email

1 min read

Understanding contingency operations for email

Contingency operations refer to military and governmental activities to prepare for, respond to, or recover from unforeseen events or emergencies....

Read More
student on smartphone for post Rethinking student support with psychoeducational text messaging

2 min read

Rethinking student support with psychoeducational text messaging

“Psychoeducation is generally known as the information and resources provided to school staff, families, and students by mental health professionals...

Read More
Image of email icon for blog about Understanding ephemeral messaging

1 min read

Understanding ephemeral messaging

Ephemeral messaging refers to sending digital messages that automatically disappear after a certain period.

Read More
Image of a stack of paper for blog on What are nonrepudiation controls?

1 min read

What are nonrepudiation controls?

Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...

Read More
Image of someone's back facing the viewer for a blog about DDos attacks and their impact on HIPAA compliance

2 min read

DDos attacks and their impact on HIPAA compliance

A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...

Read More
Image of shield for blog about Summary of the CISA FOCAL plan

2 min read

Summary of the CISA FOCAL plan

CISA released the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan on September 16, 2024, to provide...

Read More