broken lock on keyboard for post Weiser Memorial Hospital investigates possible breach

1 min read

Weiser Memorial Hospital investigates possible breach

The Boise, Idaho-based hospital is investigating a potential data breach, following threat actors claiming to have sensitive hospital information.

Read More
law gavel in front of books with a stethescope

3 min read

Can a patient sue for a HIPAA violation?

HIPAA does not allow patients to sue for violations. However, under state laws, healthcare providers can be sued. Patients can file complaints with...

Read More
security breach lock for post Patelco Credit Union experiences data breach affecting over a million

1 min read

Patelco Credit Union experiences data breach affecting over a million

In June 2024 Patelco Credit Union fell victim to a ransomware attack that compromised the personal information of over one million current and former...

Read More
mālama i ke ola health center logo image for post Maui health center hit by ransomware attack

1 min read

Maui health center hit by ransomware attack

Mālama I Ke Ola Health Center experienced a security incident resulting in unauthorized access.

Read More
Governor Tim Walz for post VA employees improperly accessed medical records of both VP candidates

2 min read

VA employees improperly accessed medical records of both VP candidates

At least a dozen employees at the U.S. Department of Veterans Affairs (VA) improperly accessed the medical records of two vice presidential nominees,...

Read More
woman sitting on laptop for post Online psychotherapy's promise and perils

2 min read

Online psychotherapy's promise and perils

The digital era rebooted our perceptions about health, and psychotherapy online has become a mainstream alternative, benefiting patients and...

Read More
t-mobile logo for post U.S. and T-Mobile agree to a $31.5 million data breach settlement

2 min read

U.S. and T-Mobile agree to a $31.5 million data breach settlement

T-Mobile has agreed to a $31.5 million settlement with the FCC in response to data breaches that affected millions of U.S. consumers over a...

Read More
chart on paper with magnifying glass for post Understanding HIPAA healthcare statistics

3 min read

Understanding HIPAA healthcare statistics

The HIPAA Privacy Rule mandates security standards for HIPAA-covered entities to protect patient information and promote cybersecurity policies....

Read More
An image of several file folders for a blog about what is a designated record set

4 min read

What is a designated record set

The designated record set (DRS) is established to determine which health information a covered entity, such as healthcare providers, health plans,...

Read More
An image of a person texting for a blog about can you text PHI internally?

2 min read

Can you text PHI internally?

Texting protected health information (PHI) internally within a healthcare organization is generally discouraged unless it complies with HIPAA...

Read More
Image of someone texting for a blog about what is text bombing?

4 min read

What is text bombing?

Text bombing is a type of cyber harassment where someone sends a large number of unsolicited text messages to a target's phone in a short period....

Read More
Graphic of multiple envelopes for a blog about keeping auto-responses HIPAA compliant

2 min read

Keeping auto-responses HIPAA compliant

Healthcare organizations must ensure they do not share protected health information (PHI) in automatic reply messages to comply with HIPAA...

Read More
Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More