floating education symbols over tablet

2 min read

PowerSchool faces large data breach

The tech vendor is known for housing student information for public schools nationwide.

Read More
floating digital healthcare icons

2 min read

How outsourcing healthcare services could lead to HIPAA violations

Organizations may choose to outsource for several reasons, including the need to reduce costs, access specialized skills, and improve scalability in...

Read More
digital documents and globe in blue

2 min read

Mechanisms to authenticate electronic protected health information

According to Section 164.312 (c )(2) of the Security Rule’s Technical Safeguards, “Mechanism to authenticate electronic protected health information...

Read More
provider pointing at clipboard with pen

2 min read

Implementation specifications group health plans must abide by

According to the Journal of Occupational and Environmental Medicine, “Under HIPAA, ‘a group health plan, and a health insurance issuer offering group...

Read More
tycon medical logo

1 min read

Tycon Medical Systems begins sending breach notices

The Virginia-based medical equipment providers is now notifying impacted customers.

Read More
digital lock with health symbol blue

2 min read

Building trust in health information exchanges

Health Information Exchanges (HIEs) have the potential to transform health care by providing secure and efficient access to patient data. These...

Read More
email icon with heart

2 min read

Secure messaging for mental health crisis intervention

Mental health professionals can ensure HIPAA compliant text messaging during a mental health crisis by selecting secure, encrypted platforms designed...

Read More
Image of school for blog about PowerSchool data breach raises alarms over student medical privacy

1 min read

PowerSchool data breach raises alarms over student medical privacy

A major education software platform in North America, PowerSchool, experienced a confirmed cyberattack impacting the data of students and teachers.

Read More
Image of medical equipment for blog about Cyber incident response playbook for medical product manufacturers

2 min read

Cyber incident response playbook for medical product manufacturers

Digital technology and manufactured equipment have transformed the medical manufacturing sector, streamlining production and enhancing efficiency....

Read More
Image of binder for blog about A guide to developing policies for handling PHI

3 min read

A guide to developing policies for handling PHI

Protected health information (PHI) is among the most sensitive data in healthcare, and safeguarding establishes patient privacy, maintains trust, and...

Read More
hacker on laptop

2 min read

MA & VA firms reach $170K settlement with HHS for ransomware breaches

Elgon Inc. and Virtual Private Network Solutions have agreed to pay $170,000 in fines and implement corrective action plans after investigations...

Read More
Image of someone on their phone for blog about Is iMessage right for healthcare communication? Here's what you need to know

2 min read

Is iMessage safe for healthcare communication

Healthcare providers face a constant challenge: finding ways to connect with clients while following complex regulations. Apple’s iMessage has become...

Read More
Image of file folders for blog about Can you be charged for requesting a copy of your PHI?

1 min read

Can you be charged for requesting a copy of your PHI?

Patients can be charged a fee for requesting a copy of their protected health information (PHI), but the fee must comply with the guidelines set...

Read More