digital face

2 min read

How deepfakes are threatening healthcare authenticity

What is a deepfake? A deepfake is a fake media file, like an image, video, or sound, produced by AI processes such as deep learning to accurately alter or fabricate content. Advanced manipulations are used to spread misinformation, impersonate, or...

Read More
doctible logo

1 min read

Is Doctible HIPAA compliant? (2025 update)

Based on our research, Doctible is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
campaign logo

1 min read

Is Campaigner HIPAA compliant? (2025 update)

Based on our research, Campaigner is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
Image of statute holding scales to represent checks and balances.

2 min read

How HSR premerger notifications impact healthcare organizations

Hart-Scott-Rodino (HSR) premerger notifications are part of the U.S. antitrust regulatory framework. According to an FTC document on HSR, “The Act...

Read More
Image of someone looking at medicine in a pharmacy, holding a tablet.

2 min read

HHS delays HIPAA rule on pharmacy standards

HHS has postponed the implementation of the HIPAA final rule modifying retail pharmacy standards, citing the need for further review and correction...

Read More
Image of blue shield with keyhole.

2 min read

Brightline reaches $7m data breach settlement

A data breach occurred within Brightline in January 2023 when the Clop ransomware group exploited a remote code execution vulnerability in Fortra’s...

Read More
Image of stethoscope and cell phone.

1 min read

Are e-consultants covered entities?

The classification of e-consults under HIPAA depends on how they function within the healthcare organization. E-consults involved in direct patient...

Read More
Image of person on a hoodie on a computer.

2 min read

New social engineering tactics

Social engineering attacks have become increasingly sophisticated as cybercriminals adapt to bypass modern security measures. While traditional...

Read More
Image of hacker on a computer.

2 min read

New phishing kit bypasses two-factor authentication

SlashNet has discovered a phishing kit that bypasses the two-factor authentication (2FA) of popular services like Google’s Gmail and Microsoft 365.

Read More
Is Postmark HIPAA compliant? (2025 update)

1 min read

Is Postmark HIPAA compliant? (2025 update)

Based on our research, Postmark is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
hacker

3 min read

How attackers weaponize legitimate system tools

Cybercriminals use legitimate system administration tools and built-in operating system features to conduct attacks, a technique known as "Living off...

Read More
appointlet logo

1 min read

Is Appointlet HIPAA compliant? (2025 update)

Based on our research, Appointlet is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
QR codes on phone

3 min read

The rise of QR code phishing in healthcare

Healthcare organizations face a growing security threat as cybercriminals leverage QR codes in phishing attacks. This emerging trend, known as...

Read More