Image of lock for blog about Chinese hackers breached more U.S. telecom companies

2 min read

Chinese hackers breached more U.S. telecom companies

Chinese state-sponsored hackers, Salt Typhoon, have ramped up cyberattacks on U.S. telecom companies, compromising sensitive communications and raising national security concerns.

Read More
Image of data network for blog about What is the ethical management of PHI?

2 min read

What is the ethical management of PHI?

A Journal of Cybersecurity and Privacy states, “Ethics in data management can be defined as the principles and practices that guide the responsible...

Read More
Image of individual on a computer for blog about Medusind data breach from 2023 affects 360,000 individuals

2 min read

Medusind data breach from 2023 affects 360,000 individuals

Medusind, a medical and dental billing company recently disclosed a data breach discovered in December 2023 and exposed the personal and health...

Read More
email icon surrounded by people icons

2 min read

The shift from traditional HIPAA compliance training methods

Traditional compliance training methods have been characterized by their reliance on passive learning techniques like lengthy lectures, PowerPoint...

Read More
Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems,...

Read More
Image of someone on a computer for blog about BayMark Health Services experiences ransomware attack

1 min read

BayMark Health Services experiences ransomware attack

BayMark Health Services, a major addiction treatment provider, has reported a ransomware attack that potentially exposed sensitive patient...

Read More
blue data screen with encryption text

2 min read

The role of automatic encryption in HIPAA compliance efforts

Automatic encryption can ensure HIPAA compliance for healthcare providers by consistently securing protected health information (PHI) without manual...

Read More
digtal smokestacks with overlaying data

3 min read

The environmental impact of using AI

As the popularity of AI technology grows, the computational power required to train and run AI models has surged. The result is an increased pressure...

Read More
digital gear blue

3 min read

The intersection of Multi-Party Computation (SMPC) and HIPAA

What is SMPC? Secure Multi-Party Computation (SMPC) is a cryptographic protocol that allows multiple parties to compute functions on private data...

Read More
floating education symbols over tablet

2 min read

PowerSchool faces large data breach

The tech vendor is known for housing student information for public schools nationwide.

Read More
floating digital healthcare icons

2 min read

How outsourcing healthcare services could lead to HIPAA violations

Organizations may choose to outsource for several reasons, including the need to reduce costs, access specialized skills, and improve scalability in...

Read More
digital documents and globe in blue

2 min read

Mechanisms to authenticate electronic protected health information

According to Section 164.312 (c )(2) of the Security Rule’s Technical Safeguards, “Mechanism to authenticate electronic protected health information...

Read More
provider pointing at clipboard with pen

2 min read

Implementation specifications group health plans must abide by

According to the Journal of Occupational and Environmental Medicine, “Under HIPAA, ‘a group health plan, and a health insurance issuer offering group...

Read More