What are predictive analytics exploits?

1 min read

What are predictive analytics exploits?

Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions based on identified patterns and trends.

Read More
Incident reports in the compliance reporting process

4 min read

Incident reports in the compliance reporting process

Healthcare settings are inherently prone to accidents and incidents that can impact patients and organizations. Maintaining an incident reporting...

Read More
How the NIST Cybersecurity Framework relates to HIPAA compliance

3 min read

How the NIST Cybersecurity Framework relates to HIPAA compliance

Recently, healthcare providers and health plans have been major targets of cyberattacks, causing the impermissible disclosure of protected health...

Read More
When are shadow records a risk to healthcare cybersecurity?

1 min read

When are shadow records a risk to healthcare cybersecurity?

Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...

Read More
Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
2024 OCR cybersecurity newsletter

3 min read

2024 OCR cybersecurity newsletter

As cyberattacks and data breaches increase, improving physical security in healthcare facilities is necessary. HIPAA-covered entities and business...

Read More
HIPAA compliance for debt collectors

3 min read

HIPAA compliance for debt collectors

Debt collection agencies working in the healthcare sector face a unique challenge: complying with the Health Insurance Portability and Accountability...

Read More
CMS notifies 1 million of data breach

2 min read

CMS notifies 1 million of data breach

The Centers for Medicare & Medicaid Services (CMS) and Wisconsin Physicians Service Insurance Corporation (WPS) have begun notifying individuals of a...

Read More
The OCR on using facility access controls

2 min read

The OCR on using facility access controls

In August 2024, the OCR released a cybersecurity newsletter on the role of facility access controls under the HIPAA Security Rule. The newsletter...

Read More
Payment gateway provider breach impacts 1.7 million credit card owners

1 min read

Payment gateway provider breach impacts 1.7 million credit card owners

What happened Slim CD recently disclosed a data breach that ultimately compromised the credit card and personal data of 1.7 million individuals.

Read More
When are subcontractors considered HIPAA business associates?

2 min read

When are subcontractors business associates under HIPAA?

Subcontractors are considered business associates under HIPAA when they directly handle, manage, or can access protected health information (PHI) as...

Read More
What is charge capture?

2 min read

What is charge capture?

Charge capture is recording and submitting for reimbursement all medical procedures and services provided to a patient within the provider's care.

Read More
How does HIPAA compliance affect patient trust?

3 min read

How does HIPAA compliance affect patient trust?

HIPAA compliance reassures patients that their privacy and security are a priority, enhancing their confidence in healthcare services.

Read More