Image of stethoscope for blog about Consequences of the Medicare Advantage (MA) plan fraud

2 min read

Consequences of the Medicare Advantage (MA) plan fraud

The U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) issued a Special Fraud Alert addressing serious concerns about fraudulent marketing arrangements in the Medicare Advantage (MA) program. These arrangements risk...

Read More
digital lock in medical environment

2 min read

Monument Health patients affected by Change Healthcare data breach

Monument Health has become the latest healthcare provider to report its fallout due to the Change Healthcare data breachthat was discovered in...

Read More
data server with red and blue lights

1 min read

Regional Care Inc. data breach exposes sensitive information of 225K

Regional Care, Inc. (RCI) recently announced a data breach that exposed the sensitive information of over 225,000 individuals. The breach, detected...

Read More
Image of locks for blog about What is deception technology?

3 min read

What is deception technology?

Deception technology is an innovative strategy for preventing cyberattacks. It involves creating a realistic decoy environment to divert...

Read More
app on smartphone

2 min read

Fighting AI data manipulation in health apps

Health apps have revolutionized personal healthcare, helping millions to manage their fitness and medical routines. Yet, as these tools become...

Read More
Image of shield for blog about What is XDR? 

3 min read

What is XDR?

As cyber threats grow more sophisticated, organizations are turning to advanced tools to protect sensitive data and maintain seamless operations....

Read More
confirmation email on smartphone

2 min read

Double opt-in and HIPAA compliance

Double opt-in is when patients confirm their subscription to receive emails by initially providing their contact information and verifying their...

Read More
digital data center blue

3 min read

What makes a data center HIPAA compliant?

Data centers provide the structure and systems needed for data-related tasks such as data processing and storage. Various industries use such centers...

Read More
woman signing papers

2 min read

New HIPAA Rule enhances protections for reproductive health information

Effective December 23, 2024, a new HIPAA Privacy Rule requires healthcare providers, covered entities, and business associates to adopt policies...

Read More
Image of gift cards for blog about OIG warns against suspect payment schemes in the Medicare Advantage program

3 min read

OIG warns against payment schemes in the Medicare Advantage program

The Office of Inspector General (OIG) has issued a Special Fraud Alert warning of potential fraud and abuse risks in marketing arrangements for...

Read More
Image of someone touching icons for email and the cloud for blog about How AI and automation are changing the face of HIPAA compliance

2 min read

How AI and automation are changing the face of HIPAA compliance

The advancement of technology, particularly in artificial intelligence (AI) and automation, is challenging traditional approaches to healthcare data...

Read More
Image of paper with data for blog about Why should EHRs be audited? 

2 min read

Why should EHRs be audited? 

Regular audits help identify vulnerabilities in electronic health records (EHRs), allowing organizations to pinpoint improvement areas. Auditing EHR...

Read More
Image of gavel and book for blog about What are the “Titles” in HIPAA?

2 min read

What are the “Titles” in HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law designed to protect sensitive patient information and improve...

Read More