red digital lock

2 min read

How cyberattacks threaten patient outcomes

Cyberattacks compromise patient privacy and safety, disrupting the financial stability of healthcare organizations. Healthcare organizations must improve their cybersecurity strategies to prevent the consequences of data breaches and system...

Read More
Image of stick figures excluding another figure for blog about Addressing implicit biases in email communication

2 min read

Addressing implicit biases in email communication

Implicit biases are the unconscious attitudes and stereotypes that influence how people make decisions. These biases can exist in healthcare...

Read More
Image of someone in a hospital bed for blog about Caring for incapacitated patients

2 min read

Caring for incapacitated patients

HIPAA mandates the protection of patient health information (PHI), and while incapacitated patients may not be able to provide consent themselves,...

Read More
Image of tiles falling over for blog about Does vulnerability management have a place in healthcare?

2 min read

Does vulnerability management have a place in healthcare?

Vulnerability management is the process of identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, which...

Read More
provider holding cellphone

4 min read

What medical professionals get wrong about HIPAA compliance

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It is a law that protects the rights and privacy of patients by...

Read More
provider with patient

4 min read

Why patients should understand what HIPAA means

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It is a law that protects the rights and privacy of patients by...

Read More
digital blue healthcare icons

4 min read

Top HIPAA-related mistakes and how to avoid them

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It is a law that protects the rights and privacy of patients by...

Read More
Image of religious symbols for blog about How belief systems and religion should factor into written communications 

2 min read

How belief systems and religion should factor into communication

Religious beliefs often influence the way people view health and acceptable treatments. While communication between patient and provider should...

Read More
Image of lock for blog about What is a threat intelligence platform?  

5 min read

What is a threat intelligence platform?

Cyber threat actors are constantly developing new tools and techniques to bypass existing defenses, putting organizations at risk of security...

Read More
Image of files transferring between individuals or computers for blog about The role of clearinghouses in PHI exchanges

2 min read

The role of clearinghouses in PHI exchanges

Clearinghouses assist protected health information (PHI) exchanges by acting as intermediaries between healthcare providers and insurance companies....

Read More
Image of phone with stethescope for blog about HIPAA compliant patient follow-up in telehealth

5 min read

HIPAA compliant patient follow-up in telehealth

Healthcare organizations can ensure HIPAA compliant patient follow-ups in telehealth by implementing secure communication methods, such as HIPAA...

Read More
Image of map for blog about Managing HIPAA compliance across borders

2 min read

Managing HIPAA compliance across borders

Healthcare providers should use HIPAA compliant email for international patients when providing telehealth services across borders. Choose an email...

Read More
Image of cloud for blog about How hackers are using AI to steal healthcare data

4 min read

How hackers are using AI to steal healthcare data

Research on Artificial Intelligence in Healthcare and Education defines AI as computer systems that can perform tasks that usually require human...

Read More