stack of paperwork

2 min read

Notification requirements if more than 500 individuals are affected

The Breach Notification Rule establishes protocols for handling and responding to significant data breaches involving protected health information (PHI). When a breach impacts more than 500 individuals, covered entities have to follow reporting...

Read More
HIPAA cloud with digital lock

2 min read

What are the notification requirements after a breach?

Breach notifications are important because they alert individuals whose personal data may have been compromised, helping them take necessary...

Read More
Image of thumbs pointing up or down for blog about Social media HIPAA violation series: Infant photo

2 min read

Social media HIPAA violation series: Infant photo

A photo of a baby shared online by a MUSC Health employee without parental consent illustrated ongoing issues with HIPAA compliance and social media...

Read More
Image of files going from one location to another for blog about How data portability combats vendor lock-ins

1 min read

How data portability combats vendor lock-ins

Data portability is the idea that organizations can transfer their data seamlessly between different platforms or applications. The concept is put in...

Read More
Image of someone on a computer for blog about Single email breach exposes sensitive data of 11,000 minors

1 min read

Single email breach exposes sensitive data of 11,000 minors

A phishing attack on Datavant exposed the sensitive data of over 11,000 minors, revealing the impact of a single compromised email account.

Read More
data breach text on paper

2 min read

How to know if your organization has experienced a breach

As seen in the case of the data breach experienced by Familylinks, the organization noticed suspicious activity in one of their employee email...

Read More
clipboard with magnifying glass and security symbols

2 min read

What are the HIPAA requirements after a breach?

Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches...

Read More
digital computer icons in blue

2 min read

SIEMs and their role in breach detection

More than one-third of responding health institutions reported at least one ransomware attack in the preceding year, according to a 2021 report by...

Read More
familylinks logo

2 min read

Familylinks concludes 3-month review of data breach

Familylinks concluded a three-month comprehensive review of all data affected after suspicious activity was detected within one of its employee's...

Read More
computer server red background

1 min read

Rhode Island computer network hit by cyberattack

The attack resulted in the state shutting down its online benefits systems.

Read More
Image of stars for blog about Social media HIPAA violation series: Online reviews

2 min read

Social media HIPAA violation series: Online reviews

A New Jersey psychiatric practice faced a $30,000 settlement after disclosing patient information in responses to online reviews.

Read More
Image of glucose monitor for blog about What is patient-generated health data?

2 min read

What is patient-generated health data?

Patient-generated health data (PGHD) allows patients to participate in their health management by reporting data related to their well-being or...

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More