Image of someone holding a phone for blog about keeping texts for legal defensibility

2 min read

Keeping texts for legal defensibility

Retaining text messages can protect organizations legally by preserving accurate records of communications in the event of legal disputes, regulatory audits, or compliance investigations.

Read More
Image of lock on keyboard for aticle about what is a pass-the-hash attack?

3 min read

What is a pass-the-hash attack?

According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it...

Read More
healthcare worker in protective gear for post Breaking confidentiality during public health concerns

4 min read

Breaking confidentiality during public health concerns

During public health crises, the ethical obligation to maintain confidentiality can come into conflict with the need to protect the wider population...

Read More
shelves of paper medical records for post Why certain hospitals have a higher risk of violating HIPAA

3 min read

Why certain hospitals have a higher risk of violating HIPAA

Hospitals must prevent HIPAA violations using an advanced cybersecurity framework, staff training, and behavioral policies.

Read More
Chinese flag for post Massive data breach linked to China

2 min read

Massive data breach linked to China

New reports have revealed that a data breach of major US telecom firms, including AT&T and Verizon, is linked to Chinese hackers.

Read More
law gavel for post Class action lawsuit filed against Columbus Regional Healthcare System

1 min read

Class action lawsuit filed against Columbus Regional Healthcare System

The North Carolina hospital system is facing a class action lawsuit after a 2023 data breach.

Read More
stack of medical records with stethoscope for post ACLU and NaphCare dispute exposure of inmate health records

3 min read

ACLU and NaphCare dispute exposure of inmate health records

A recent incident has raised concerns over inmate privacy, with the electronic records for over 70 individuals incarcerated in Alaska’s prison...

Read More
US capitol building for post US Senators propose stricter cybersecurity for healthcare entities

3 min read

US Senators propose stricter cybersecurity for healthcare entities

In response to the growing threat of cyberattacks on the healthcare sector, two Democratic senators have proposed a new bill to strengthen...

Read More
Image of phone and laptop for blog about Understanding contextual multi-factor authentication (MFA)

3 min read

Understanding contextual multi-factor authentication (MFA)

Contextual multi-factor authentication (MFA), also known as adaptive authentication, is an advanced security approach that adjusts authentication...

Read More
Image of a scale for a blog about the balancing act in healthcare

3 min read

The balancing act in healthcare

The "Balancing Act" is a metaphor used to describe the process of managing competing demands, priorities, or responsibilities to maintain equilibrium...

Read More
Image of the world for blog about Understanding data sovereignty

2 min read

Understanding data sovereignty

A journal article published in Big Data & Society states that data sovereignty “typically relates in some way to meaningful control, ownership, and...

Read More
An image of a gavel and a piece of paper with words for a blog about the importance of legal counsel on HIPAA compliance teams

2 min read

The importance of legal counsel on HIPAA compliance teams

Legal counsel in the compliance team is key to understanding HIPAA regulations and addressing potential legal issues. The advisor guarantees that all...

Read More
glasses in front of computer screen for post PRC-Saltillo experiences data breach affecting 51,627

2 min read

PRC-Saltillo experiences data breach affecting 51,627

Ohio-based healthcare provider Prentke Romich Company (operating as PRC-Saltillo) filed a data breach notification with the Massachusetts Attorney...

Read More