Unsecured database exposes therapy records from mental health firm

3 min read

Unsecured database exposes therapy records from mental health firm

A security breach has exposed the health details of thousands of individuals seeking mental health and addiction treatment services.

Read More
FAQs: Audit trails and HIPAA

2 min read

FAQs: Audit trails and HIPAA

Audit trails keep track of system events, identifying individuals who accessed specific data and at what time. In the context of HIPAA, audit trails...

Read More
Microsoft detects Vanilla Tempest in new healthcare ransomware

2 min read

Microsoft detects Vanilla Tempest in new healthcare ransomware

Microsoft reports that a ransomware group, Vanilla Tempest, is now targeting U.S. healthcare organizations using INC ransomware in a recent wave of...

Read More
Impact of insurance fraud on the economy

2 min read

Impact of insurance fraud on the economy

Insurance fraud is a serious and growing problem affecting all economic sectors, including healthcare. According to a 2022 study conducted for the...

Read More
Senior citizens at risk after Welcome Health data breach

2 min read

Senior citizens at risk after Welcome Health data breach

On September 6, 2024, a senior primary care facility, Welcome Health, reported that an unauthorized individual accessed an employee's email,...

Read More
What are informal caregiver networks?

2 min read

What are informal caregiver networks?

Informal caregiver networks are naturally formed groups of family, friends, and neighbors assisting in the care of a loved one in need of medical...

Read More
What happens to data retention when a patient withdraws consent?

2 min read

Data retention after a patient withdraws consent

When a patient withdraws consent, healthcare organizations must stop using and disclosing information for purposes covered by that consent. They are,...

Read More
What is a virtual network function?

1 min read

What is a virtual network function?

Network function virtualization is a technology that transforms traditional network functions from hardware-based solutions into software...

Read More
HIPAA compliant approaches to patient data backup and recovery

2 min read

HIPAA compliant approaches to data backup and recovery

HIPAA compliant approaches to patient data backup and recovery should involve identifying protected health information (PHI), conducting risk...

Read More
HIPAA compliant communication strategies for psychologists

3 min read

HIPAA compliant communication strategies for psychologists

HIPAA compliant communication for psychologists involves using secure tools (encrypted email and messaging apps), obtaining patient consent,...

Read More
Establishing a HIPAA compliance team

3 min read

Establishing a HIPAA compliance team

Establishing a HIPAA compliance team is a proactive step toward ensuring that your organization meets its legal obligations and protects patient...

Read More
Understanding the different medical claim forms

1 min read

Understanding the different medical claim forms

Medical claims are form requests submitted by healthcare providers to insurance companies and government programs for reimbursement for services...

Read More
Deepfake technology in social engineering attacks

2 min read

Deepfake technology in social engineering attacks

The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...

Read More