diabetes device in arm with smartphone app

2 min read

Should remote monitoring technologies be HIPAA compliant?

Yes, remote monitoring technologies (RMTs) should be HIPAA compliant.

Read More
Image of data to represent AI for blog about HHS issues guidelines to ensure fair and secure use of AI in healthcare

3 min read

HHS issues guidance to ensure fair and secure use of AI in healthcare

The HHS Office for Civil Rights has issued guidance to healthcare entities on responsibly using AI tools, emphasizing compliance with...

Read More
smartphone with red location pin

1 min read

Millions of smartphone users location data stolen in major hack

The attack is estimated to impact hundreds of companies and millions of smartphone users.

Read More
Image of scale for blog about What is ECCS?

2 min read

What is ECCS?

Ethical compliance and conduct standards (ECCS) outline acceptable behaviors and practices for staff. An International Journal of Research in...

Read More
Image of lock for blog about Chinese hackers breached more U.S. telecom companies

2 min read

Chinese hackers breached more U.S. telecom companies

Chinese state-sponsored hackers, Salt Typhoon, have ramped up cyberattacks on U.S. telecom companies, compromising sensitive communications and...

Read More
Image of data network for blog about What is the ethical management of PHI?

2 min read

What is the ethical management of PHI?

A Journal of Cybersecurity and Privacy states, “Ethics in data management can be defined as the principles and practices that guide the responsible...

Read More
Image of individual on a computer for blog about Medusind data breach from 2023 affects 360,000 individuals

2 min read

Medusind data breach from 2023 affects 360,000 individuals

Medusind, a medical and dental billing company recently disclosed a data breach discovered in December 2023 and exposed the personal and health...

Read More
email icon surrounded by people icons

2 min read

The shift from traditional HIPAA compliance training methods

Traditional compliance training methods have been characterized by their reliance on passive learning techniques like lengthy lectures, PowerPoint...

Read More
Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems,...

Read More
Image of someone on a computer for blog about BayMark Health Services experiences ransomware attack

1 min read

BayMark Health Services experiences ransomware attack

BayMark Health Services, a major addiction treatment provider, has reported a ransomware attack that potentially exposed sensitive patient...

Read More
blue data screen with encryption text

2 min read

The role of automatic encryption in HIPAA compliance efforts

Automatic encryption can ensure HIPAA compliance for healthcare providers by consistently securing protected health information (PHI) without manual...

Read More
digtal smokestacks with overlaying data

3 min read

The environmental impact of using AI

As the popularity of AI technology grows, the computational power required to train and run AI models has surged. The result is an increased pressure...

Read More
digital gear blue

3 min read

The intersection of Multi-Party Computation (SMPC) and HIPAA

What is SMPC? Secure Multi-Party Computation (SMPC) is a cryptographic protocol that allows multiple parties to compute functions on private data...

Read More