smartphone on red background

2 min read

Apple and Google remove malware-infected apps after year-long data theft

Apple and Google removed 20 malware-infected apps after researchers uncovered a year-long data theft campaign targeting cryptocurrency wallets and personal data.

Read More
new relic logo

1 min read

Is New Relic HIPAA compliant? (2025 update)

Based on our research, New Relic is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
unitedhealth group logo

2 min read

UnitedHealth Group resists shareholder proposal on delayed and denied care

UnitedHealth Group is pushing back against a shareholder proposal calling for reports on the broader economic impact of its practices that delay or...

Read More
california capitol building

2 min read

California reintroduces bill to limit private equity in healthcare

California lawmakers have introduced SB 351, a bill aimed at restricting private equity’s involvement in healthcare management. This bill echoes many...

Read More
acuity logo

1 min read

Is Acuity Scheduling HIPAA compliant? (2025 update)

Based on our research, Acuity Scheduling is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
Image of two people's hands shaking.

2 min read

What is the difference between a business associate and a vendor?

A business associate is a person or entity that performs services or functions on behalf of a covered entity that involves the use or disclosure of...

Read More
Image of megaphone.

2 min read

What is retargeting and how is it relevant in healthcare?

Retargeting is a digital marketing strategy that focuses on re-engaging users who have previously interacted with a brand’s website but did not...

Read More
Image of web browser.

3 min read

The threat of web application attacks

Healthcare organizations rely on web applications for their operations, including Electronic Health Records (EHR), patient portals, telehealth...

Read More
Image of blue shield with lock in it.

2 min read

Do business associates need to have a HIPAA compliance officer?

Business associates are not explicitly required by HIPAA to have a designated HIPAA compliance officer like covered entities. However, having a...

Read More
Image of envelope in yellow neon.

2 min read

Examples of email-based attacks

Email-based attacks continue to pose significant threats to organizations, with the FBI's Internet Crime Complaint Center (IC3) reporting a record...

Read More
Image of person in a hoody at a computer.

1 min read

Included Health Inc. data breach exposes sensitive patient information

Included Health, Inc. reported a data breach on February 13, 2025, exposing sensitive patient information, including names and medical records.

Read More
laptop with stethoscope

2 min read

Protecting remote healthcare workers with SASE

The shift to remote healthcare delivery has permanently altered the cybersecurity landscape. With clinicians accessing patient data from home offices...

Read More
l-soft logo

1 min read

Is L-Soft HIPAA compliant? (2025 update)

Based on our research, L-Soft is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More