Image of computer hardware for blog about What is operational technology? 

2 min read

What is operational technology? 

Operational technology (OT) is the hardware and software systems that monitor, control and manage operations. OT systemswhen combined with information technology (IT) are part of a comprehensive model for the protection of an organization's...

Read More
Image of someone sending an email for blog about Hallmarks of phishing attempts

2 min read

Hallmarks of phishing attempts

Phishing attacks are growing more sophisticated, but recognizing their common characteristics can keep you ahead of the curve. According to CISA...

Read More
Image of elderly person holding hands with younger person for blog about Social media HIPAA violation series: Glenview Nursing Home and videos

2 min read

Social media HIPAA violation series: Glenview Nursing Home and videos

A Snapchat video of employees taunting a dementia patient led to a lawsuit against Glenview Nursing Home for violating patient privacy and abuse...

Read More
Image of stars and person on phone to signal writing a review for a blog about Social media HIPAA violation series: Elite Dental Associates - Yelp review 

2 min read

Social media HIPAA violation series: Elite Dental Associates and Yelp 

A dental practice’s response to a Yelp review led to a $10,000 HIPAA fine and showed the risks of disclosing patient information online.

Read More
US office of inspector general logo

1 min read

OCR’s HIPAA audit strategy scrutinized in new report

The Office of Inspector General (OIG) criticized the Office for Civil Rights (OCR) for failing to follow up on compliance issues identified in HIPAA...

Read More
graphic of law gavel and documents

2 min read

Senators introduce bipartisan Bill to strengthen healthcare cybersecurity

Four US senators introduced The Health Care Cybersecurity and Resiliency Act of 2024. The bipartisan bill will improve cybersecurity across...

Read More
computer code on screen

1 min read

Michigan medical practice exposes patient data in email breach

East Paris Internal Medicine Associates, PC, recently experienced a data breach affecting thousands of individuals through an email-related attack.

Read More
neuralink logo

2 min read

Bridging innovation and privacy in Musk’s Neuralink trials

Elon Musk’s Neuralink is making a giant leap into uncharted territory with its brain implant and robotic arm, pushing the boundaries of neuroscience...

Read More
finger pointing to legal scale

1 min read

OCR fines Holy Redeemer $35K for Privacy Rule violation

On November 26, 2024, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced a $35,581 settlement with Holy...

Read More
bug on keyboard

3 min read

Understanding next-generation antivirus

According to Crowdstrike, “Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioral detection, machine learning...

Read More
Image of warning sign for blog about Black Basta Ransomware group targets Microsoft Teams for social engineering attacks

2 min read

Black Basta Ransomware group targets Microsoft Teams for attacks

The Black Basta ransomware group has escalated its cyberattacks by using Microsoft Teams to impersonate IT personnel. The tactic tricks employees...

Read More
Image of researcher for blog about Are tissue repositories covered entities?

3 min read

Are tissue repositories covered entities?

Tissue repositories are any facilities that collect or store tissue for research purposes. According to the HHS, tissue repositories are not covered...

Read More
apple icon on laptop

3 min read

The latest scam: ‘Your Apple ID is suspended’

What happened A new phishing scam is targeting Apple users by sending fake emails claiming that the recipient's Apple ID, now referred to as "Apple...

Read More