digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential dangers within their walls. To better protect patient information, organizations should understand...

Read More
exterior shot of US White House

3 min read

How Trump 2.0 could transform healthcare policies and privacy

President-elect Donald Trump’s return could bring several changes in US health policy, with reforms across Medicaid, the Affordable Care Act, and...

Read More
Image of tablet, laptop, and phone, for blog about how to handle the threat of lost devices 

2 min read

How to handle the threat of lost devices 

With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...

Read More
medical symbol for post The HHS’ 5 best practices for HIPAA compliance

2 min read

The HHS’ 5 best practices for HIPAA compliance

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, the Department of Health and Human Services...

Read More
Image of lock for blog about Preventing cyberattacks after layoffs

3 min read

Preventing cyberattacks after layoffs

According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...

Read More
Image of file folders for blog about Should business associates provide individuals with an accounting of disclosures?

2 min read

Should business associates provide an accounting of disclosures?

The HIPAA Privacy Rule does not require business associates to provide individuals with an accounting of disclosures. This responsibility falls...

Read More
Image of someone sending a message for blog about Third-party messaging apps and HIPAA compliance

3 min read

Third-party messaging apps and HIPAA compliance

Healthcare organizations love being able to message patients on apps, but these providers need to stay HIPAA compliant and maintain patient trust....

Read More
Image of several electornic devices, like a laptop and phone, for blog about Acceptable use policies (AUP) and HIPAA compliance

3 min read

Acceptable use policies (AUP) and HIPAA compliance

An acceptable use policy (AUP) sets clear guidelines on how healthcare employees should securely handle technology and patient data. It outlines...

Read More
Image of checklist for blog about Preparing for a cyberattack

2 min read

Preparing for a cyberattack

A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...

Read More
Image of surveillance camera for blog about HIPAA and video surveillance 

4 min read

HIPAA and video surveillance

Healthcare organizations have long used video surveillance to enhance security, monitor patient and staff activities, and reduce risks. However,...

Read More
docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More
supreme court building for post US Supreme Court torn over Facebook lawsuit

1 min read

US Supreme Court torn over Facebook lawsuit

The company has been accused of fraud and misleading shareholders about user data.

Read More
blue digital lock for post October OCR cybersecurity newsletter warns of social engineering attacks

2 min read

October OCR cybersecurity newsletter warns of social engineering attacks

The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...

Read More