Image of someone checking their email for blog about The implications of non-HIPAA compliant communication in healthcare

4 min read

The implications of non-HIPAA compliant communication in healthcare

The consequences of not following HIPAA guidelines in healthcare communication can be serious and wide-ranging. Healthcare providers risk facing fines, criminal charges, damage to their reputation, and even patient lawsuits. Implementing HIPAA...

Read More
Image of eye machine for blog about Mid Atlantic Retina patients affected by ConnectOnCall data breach

2 min read

Mid Atlantic Retina patients affected by ConnectOnCall data breach

Mid Atlantic Retina patients' sensitive information was compromised in a data breach linked to ConnectOnCall, a vendor managing after-hours calls for...

Read More
Image of data for blog about Does HIPAA apply to data brokers? 

1 min read

Does HIPAA apply to data brokers? 

Data brokers typically aggregate and sell health-related data obtained from various sources like public records and health apps. A journal article...

Read More
revive old post logo

1 min read

Is Revive Old Post HIPAA compliant? (2025 update)

Based on our research, Revive Old Post is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and...

Read More
Image of ambulance for article about Operations disrupted at Frederick Health Hospital after cyber attack

2 min read

Operations disrupted at Frederick Health Hospital after cyber attack

A ransomware attack on Frederick Health Hospital led to the shutdown of critical systems, diversion of ambulances, and significant disruption in...

Read More
Image of someone writing for blog about What are PHRs?

2 min read

What are PHRs?

Personal health records (PHRs) are electronic tools that allow for the management and maintenance of health information. The practice differs from...

Read More
Image of someone typing for blog about The importance of training for email security

2 min read

The importance of training for email security

When it comes to email security, technology often takes center stage. Encryption, firewalls, and spam filters are tools used for protecting sensitive...

Read More
Image of lock on keyboard for blog about Cabrillo College sends out breach notifications

1 min read

Cabrillo College sends out breach notifications

Cabrillo College has begun notifying individuals of a data breach that exposed sensitive personal information after unauthorized access to its...

Read More
blue email icon with security lock

3 min read

Email security resolutions for healthcare organizations in the new year

As we step into 2025, healthcare organizations face increasing cybersecurity threats, with email remaining one of the most vulnerable attack vectors.

Read More
email icon with magnifying glass on computer screen

2 min read

Top 5 HIPAA email violations and how to avoid them

Email is one of the most common ways healthcare organizations communicate, but it’s also a leading cause of HIPAA violations. From accidental data...

Read More
magnifying glass on paperwork

2 min read

How often should a BAA be updated?

There is no mandated timeframe for business associate agreements (BAAs) to expire or be updated, but best practices suggest that they should be...

Read More
pharmacy shelf

2 min read

Does HIPAA apply to supermarkets with a pharmacy?

Yes, HIPAA does apply to the pharmacy within the supermarket, but not the supermarket operation itself. When a supermarket operates a pharmacy, it...

Read More
flowmapp logo

1 min read

Is FlowMapp HIPAA compliant? (2025 update)

Based on our research, FlowMapp is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More