What is the use of blockchain in EHRs?

2 min read

What is the use of blockchain in EHRs?

In healthcare, a blockchain is a database of health information stored in blocks, making it more secure. In 2022, the healthcare industry further embraced blockchain technology, with its market share in the supply chain management application...

Read More
What is a HIPAA disaster recovery plan?

3 min read

What is a HIPAA disaster recovery plan?

A HIPAA disaster recovery plan details procedures for restoring any data loss resulting from a disaster. It ensures the security and availability of...

Read More
Ransomware attacks increase: $460 million paid in H1 2024

2 min read

Ransomware attacks increase: $460 million paid in H1 2024

Recent findings reveal increased ransomware attacks and profitability, raising concerns about current cybersecurity measures.

Read More
Are subcontractors business associates under HIPAA?

2 min read

Are subcontractors business associates under HIPAA?

Subcontractors can be considered business associates under HIPAA if they handle protected health information (PHI) as part of their services. If the...

Read More
What are living off the land attacks?

2 min read

What are living off the land attacks?

Living off the land attacks are when hackers use built-in tools and software already present on a computer to carry out malicious activities...

Read More
Researcher sued for sharing data leaked in Columbus ransomware attack

2 min read

Researcher sued for sharing data leaked in Columbus ransomware attack

The City of Columbus, Ohio, has filed a lawsuit against cybersecurity researcher David Leroy Ross, also known as Connor Goodwolf. The lawsuit accuses...

Read More
What is tokenization?

4 min read

What is tokenization?

Tokenization substitutes sensitive data with unique, randomized tokens without a mathematical relationship to the original information. These tokens...

Read More
Change Healthcare breach exposes gaps in healthcare cybersecurity

4 min read

Change Healthcare breach exposes gaps in healthcare cybersecurity

The ransomware attack on Change Healthcare in February 2024 revealed the vulnerabilities within the sector and the serious consequences of such...

Read More
Analysis of the 2024 Verizon data breach investigation report

3 min read

Analysis of the 2024 Verizon data breach investigation report

The Verizon Data Breach Investigations Report (DBIR) has long been a trusted resource for security professionals, offering an analysis of the latest...

Read More
Can a covered entity send ePHI through an unsecured app?

2 min read

Can a covered entity send ePHI through an unsecured app?

A covered entity can only send electronic protected health information (ePHI) through an unsecured app if a patient requests it. If a patient asks to...

Read More
Everest ransomware group targeting healthcare industry

2 min read

Everest ransomware group targeting healthcare industry

Everest, a Russian-speaking ransomware group, has targeted entities like NASA and the Brazilian government. Now, they're focusing on the healthcare...

Read More
What is a rootkit?

3 min read

What is a rootkit?

A rootkit is a type of malware that allows cyber criminals to access and infiltrate data without being detected.

Read More
Strive Medical faces data breach

1 min read

Strive Medical faces data breach

Strive HoldCo, also known as Strive Medical, recently filed a notice of a data breach.

Read More