laptop with lung xray, tablet with body scan and stethoscope on surface

2 min read

Aligning clinical trial innovation with HIPAA standards

Clinical trial enrollment is often more driven by sociodemographic factors rather than clinical factors, making it difficult to obtain a diverse pool of participants. In a bid to help solve this, researchers from the NIH have come up with an...

Read More
Image of congress room for blog about What providers must know about the new cybersecurity Senate Bill

2 min read

What providers should know about the new cybersecurity Senate Bill

The U.S. Senate has introduced the Health Care Cybersecurity and Resiliency Act of 2024, a bipartisan effort aimed at enhancing cybersecurity in the...

Read More
Image of two people holding hands for blog about HIPAA email for end-of-life care

3 min read

HIPAA email for end-of-life care

End-of-life care conversations are important yet sensitive, allowing patients and their families to make informed decisions during difficult times....

Read More
Image of lock for blog about Massive data breach exposes 34,000 patients' PHI

1 min read

Massive data breach exposes 34,000 patients' PHI

The HHS announced a $1.19 million penalty against Gulf Coast Pain Consultants, LLC for multiple violations of the HIPAA Security Rule.

Read More
Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These...

Read More
laptop with ransomware text

1 min read

Nearly 30K exposed in Colonial Behavioral Health ransomware attack

Colonial Behavioral Health (CBH), a Virginia-based healthcare services provider, announced a data breach on November 27, 2024, following a ransomware...

Read More
provider and patient hands

3 min read

HIPAA compliant communication in patient-centered care

Patient-centered care is a comprehensive care model that focuses on the patient’s symptoms, medical history, emotional, social, and financial factors...

Read More
Image of WiFi symbol for blog about Russian hackers exploit WiFi to breach US firm using nearest-neighbor attack

2 min read

Russian hackers exploit WiFi using nearest-neighbor attack

Russian hackers used a ‘nearest-neighbor attack’ through WiFi to breach a US company, trying to infiltrate Ukraine-related projects.

Read More
Image of vaccine and needle for blog about Social media HIPAA violation series: Texas Children's Hospital - Vaccination controversy

2 min read

Social media HIPAA violations: Texas Hospital vaccination controversy

A nurse’s social media post about a pediatric measles patient led to her termination and showcased the risks of sharing patient information online.

Read More
Image of camera for blog about Can healthcare providers allow media in treatment areas?

2 min read

Can healthcare providers allow media in treatment areas?

Healthcare providers cannot invite or arrange for members of the media, including film crews, to enter treatment areas of their facilities without...

Read More
blue yonder logo

1 min read

Blue Yonder data breach exposes supply chain vulnerabilities

Blue Yonder experienced a data breach, compromising its operations and potentially clients relying on the supply chain management solution.

Read More
red digital email icon

2 min read

Healthcare breach roundup: Week of 11/18/24

The following breaches in healthcare were reported this week:

Read More
law gavel on keyboard

1 min read

Idaho hacker sentenced to 10 years for data theft and extortion

Robert Purbeck, a 45-year-old Idaho resident, was recently sentenced to a decade in prison for hacking into at least 19 organizations, stealing...

Read More