3 min read
Unsecured database exposes therapy records from mental health firm
A security breach has exposed the health details of thousands of individuals seeking mental health and addiction treatment services.
Read More3 min read
A security breach has exposed the health details of thousands of individuals seeking mental health and addiction treatment services.
Read More2 min read
Audit trails keep track of system events, identifying individuals who accessed specific data and at what time. In the context of HIPAA, audit trails...
2 min read
Microsoft reports that a ransomware group, Vanilla Tempest, is now targeting U.S. healthcare organizations using INC ransomware in a recent wave of...
2 min read
Insurance fraud is a serious and growing problem affecting all economic sectors, including healthcare. According to a 2022 study conducted for the...
2 min read
On September 6, 2024, a senior primary care facility, Welcome Health, reported that an unauthorized individual accessed an employee's email,...
2 min read
Informal caregiver networks are naturally formed groups of family, friends, and neighbors assisting in the care of a loved one in need of medical...
2 min read
When a patient withdraws consent, healthcare organizations must stop using and disclosing information for purposes covered by that consent. They are,...
1 min read
Network function virtualization is a technology that transforms traditional network functions from hardware-based solutions into software...
2 min read
HIPAA compliant approaches to patient data backup and recovery should involve identifying protected health information (PHI), conducting risk...
3 min read
HIPAA compliant communication for psychologists involves using secure tools (encrypted email and messaging apps), obtaining patient consent,...
3 min read
Establishing a HIPAA compliance team is a proactive step toward ensuring that your organization meets its legal obligations and protects patient...
1 min read
Medical claims are form requests submitted by healthcare providers to insurance companies and government programs for reimbursement for services...
2 min read
The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...