packs of birth control pills

3 min read

Ongoing safety concerns and legal battles in contraceptive care

The recent recall of Yaz Plus, a hormonal contraceptive pill, in South Africa, threw the spotlight on the safety of birth control pills, with several lawsuits and controversies concerning Yaz and its counterparts (including Yaz, Yasmin, Ocella,...

Read More
medical monitoring device on wrist with smartphone

1 min read

FDA recommendations pave the way for safer AI-driven medical devices

The FDA has introduced recommendations for managing the continuous updates of AI-enabled medical devices. The approach includes a plan outlining how...

Read More
blood supply bags with barcode

2 min read

FDA urges blood suppliers to improve cyber defenses

The US Food and Drug Administration (FDA) recently called on blood suppliers to increase their cybersecurity to safeguard the safety and integrity of...

Read More
floating people icons with magnifying glass

2 min read

How HIPAA compliant email can improve healthcare staff communication

According to an article on the communication gaps between primary care and specialist physicians, less than a quarter (22%) of primary care...

Read More
Image of lock for blog about What does HIPAA compliance look like?

3 min read

What does HIPAA compliance look like?

HIPAA compliance involves adhering to the standards set forth by the Health Insurance Portability and Accountability Act (HIPAA) to ensure the...

Read More
Image of a stack of files for blog about Internal vs External HIPAA audits

3 min read

Internal vs External HIPAA audits

Internal and external HIPAA audits are not interchangeable; they are complementary tools in a comprehensive compliance strategy. Internal audits are...

Read More
representation of hacker surrounded by floating email icons

2 min read

Russia arrests suspected ransomware actor wanted by FBI

Russian authorities arrest a high-profile ransomware suspect wanted by the FBI, spotlighting international tensions over cybercrime enforcement.

Read More
blue digital lock shield

2 min read

Understanding risk mitigation strategy

According to the HHS Security Series on Risk Analysis and Management, “The required implementation specification at § 164.308(a)(1)(ii)(A), for Risk...

Read More
hands going through paperwork

3 min read

The steps required for a risk analysis

Risk analysis includes identifying where ePHI is created, received, maintained, or transmitted. Organizations can discover potential risks to their...

Read More
Image of locks for blog about Managing technological and physical risk

1 min read

Managing technological and physical risks

Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...

Read More
Image of two people looking at data for blog about Internal HIPAA audits

2 min read

Internal HIPAA audits

Internal HIPAA audits are a vital step toward ensuring the security and privacy of PHI. They help organizations remain compliant and build a culture...

Read More
Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...

Read More
open lock with computer code

1 min read

More than 10,000 affected in Connecticut GI breach

On December 2, 2024, Connecticut GI and Gastroenterology Associates of Fairfield reported a data breach involving the theft of 10,568 patients’...

Read More