1 min read
Children’s Hospital Colorado fined $548K for HIPAA violations
Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.
Read More1 min read
Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.
Read More3 min read
While organizations have flexibility in structuring their compliance functions, having dedicated HIPAA compliance staff can help ensure ongoing...
2 min read
Elekta Inc. and Northwestern Memorial Healthcare recently agreed to an $8.9 million settlement after a 2021 ransomware attack compromised the...
3 min read
What is a data breach? Data breaches occur when sensitive, confidential, or protected information is accessed or disclosed without proper...
2 min read
Enhancing scalability in patient engagement facilitates efficient, consistent, and personalized care. Making sure your organization is scaling up as...
2 min read
Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...
2 min read
Atrium Health has disclosed a data breach affecting over 585,000 individuals, linked to third-party tracking technologies on its patient portal.
2 min read
Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...
2 min read
Forensic firms are mostly responsible for analyzing the systems of organizations extensively, usually following a data breach. Through their work,...
2 min read
A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...
2 min read
Social awareness is the ability to recognize and understand the emotions, thoughts, and perspectives of others. The concept is often reflected in how...
2 min read
What happened Salt Typhoon, a Chinese cyber-espionage group, allegedly infiltrated at least eight US telecommunications firms, stealing large volumes...
2 min read
The motive behind a data breach is often reflected in the financial, ideological, and strategic interests of threat actors.It is especially financial...