childrens hospital colorado logo

1 min read

Children’s Hospital Colorado fined $548K for HIPAA violations

Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.

Read More
blue digital check boxes

3 min read

Do you need a dedicated HIPAA compliance officer?

While organizations have flexibility in structuring their compliance functions, having dedicated HIPAA compliance staff can help ensure ongoing...

Read More
legal scale with cash

2 min read

$8.9M settlement reached in Elekta and NMH data breach affect

Elekta Inc. and Northwestern Memorial Healthcare recently agreed to an $8.9 million settlement after a 2021 ransomware attack compromised the...

Read More
digital locks on red blocks

3 min read

Types of data breaches

What is a data breach? Data breaches occur when sensitive, confidential, or protected information is accessed or disclosed without proper...

Read More
Image of blocks for blog about Scalability and patient engagement

2 min read

Scalability and patient engagement

Enhancing scalability in patient engagement facilitates efficient, consistent, and personalized care. Making sure your organization is scaling up as...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
atrium health logo

2 min read

Atrium Health notifies HHS of data breach impacting over 585,000

Atrium Health has disclosed a data breach affecting over 585,000 individuals, linked to third-party tracking technologies on its patient portal.

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

2 min read

The uses of control analyses in email

Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...

Read More
Image of someone analyzing data for blog about Do forensic firms need to be HIPAA compliant? 

2 min read

Do forensic firms need to be HIPAA compliant? 

Forensic firms are mostly responsible for analyzing the systems of organizations extensively, usually following a data breach. Through their work,...

Read More
Image of thumbs up and down for blog about Social media HIPAA violation series: Twitter disclosure

2 min read

Social media HIPAA violation series: Twitter disclosure

A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...

Read More
Image of hands for blog about What is the role of social awareness in mental health communications?

2 min read

What is the role of social awareness in mental health communications?

Social awareness is the ability to recognize and understand the emotions, thoughts, and perspectives of others. The concept is often reflected in how...

Read More
cellphone tower with red

2 min read

Chinese cyber-espionage group hacks at least 8 major US telecom networks

What happened Salt Typhoon, a Chinese cyber-espionage group, allegedly infiltrated at least eight US telecommunications firms, stealing large volumes...

Read More
stethoscope with computer data

2 min read

Why healthcare organizations are common targets for data breaches

The motive behind a data breach is often reflected in the financial, ideological, and strategic interests of threat actors.It is especially financial...

Read More