Image of shield with keyhole.

2 min read

Applying continuous threat management to email communication audits

Continuous threat management, or continuous threat exposure management (CTEM), is a cybersecurity strategy designed to mitigate threats across an organization's digital footprint. The approach is based on the execution of a five stage process:...

Read More
Image of Internet search bar.

2 min read

What is real-time URL scanning?

Email security threats continue to evolve, with malicious URLs becoming increasingly sophisticated. According to research from Beijing Electronic...

Read More
Image of hands holding a heart.

2 min read

Does HIPAA apply to HRAs?

HIPAA applies to Health Reimbursement Arrangements (HRAs) because the plans involve handling protected health information (PHI). HRAs are account...

Read More
Image of hooded figure behind a computer.

2 min read

Finastra alerts victims of breach exposing financial information

Finastra is notifying victims of an October 2024 data breach that exposed financial information to unauthorized attackers.

Read More
Image of several people on computers in a meeting.

2 min read

Building healthcare security awareness programs

Healthcare organizations face unique cybersecurity challenges, from protecting patient data to maintaining HIPAA compliance. While technical controls...

Read More
Image of woman sitting next to a stroller.

1 min read

Baby product retailer Nuna reports data breach of 16,000 consumers

Nuna Baby Essentials has disclosed a data breach that went undetected for nearly five months, potentially exposing sensitive information of more than...

Read More
digital law gavel

2 min read

Amazon faces first test of Washington's health data privacy law

A Washington state privacy law faces its first major test as Amazon confronts a class-action lawsuit over alleged unauthorized collection of consumer...

Read More
floating medical icons

4 min read

Health insurance vs. medical aid: What’s the difference?

According to the Centers for Medicare and Medicaid Services, “Health care coverage is often grouped into two general categories: private and public....

Read More
ransomware text with digital skull

1 min read

Agencies warn of Ghost ransomware activity

The FBI, CISA, and MS-ISAC have issued a joint advisory warning about the Ghost ransomware group, which has been active since 2021.

Read More
telegram logo

1 min read

Is Telegram HIPAA compliant? (2025 update)

Based on our research, Telegram is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
digital blue law gavel

2 min read

Healthcare leaders push back against new HIPAA cybersecurity rule

On February 21, 2025, the Association of American Medical Colleges (AAMC), along with several other healthcare organizations, sent a letter urging...

Read More
Is Basecamp HIPAA compliant? (2025 update)

1 min read

Is Basecamp HIPAA compliant? (2025 update)

Based on our research, Basecamp is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
calculator and paperwork

2 min read

Can accounting firms be business associates?

Accounting firms can be consideredbusiness associates if they handle protected health information (PHI) as part of their services to healthcare...

Read More