Image of lock for blog about How DNSSEC works and why it matters

2 min read

How DNSSEC works and why it matters

The Domain Name System (DNS) acts like the internet’s address book, translating domain names into IP addresses. Traditional DNS has no built-in security, leaving it vulnerable to attacks like cache poisoning and man-in-the-middle exploits. DNSSEC...

Read More
Image of someone on a computer for blog about U.S. Army soldier arrested for alleged role in hacking incident

3 min read

U.S. Army soldier arrested for alleged role in hacking incident

A U.S. Army communications specialist was arrested in Texas for allegedly leaking presidential call logs and hacking telecommunications firms as part...

Read More
Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More
Image of laptop for blog about What are technology-neutral standards? 

1 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of two people shaking hands for blog about Mergers and HIPAA

2 min read

Mergers and HIPAA

Mergers in the healthcare industry can significantly impact compliance with the Health Insurance Portability and Accountability Act (HIPAA). While...

Read More
law gavel and scale

2 min read

Elgon Information Systems to pay $80,000 for ransomware breach

The HHS Office for Civil Rights (OCR) issued its first HIPAA enforcement action of 2025, settling on a $80,000 penalty on Elgon Information Systems...

Read More
red computer data lines

2 min read

The role of Google's Red Team in securing AI development

Google's Red Team represents a major component in the company's approach to AI security, working to identify and address potential vulnerabilities...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
red data background with lock

1 min read

22K consumers affected by In-Home Attendant Services breach

Texas-based healthcare provider In-Home Attendant Services, Ltd. recently reported that a data breach affected 22,000 consumers, exposing their...

Read More
smartphone sitting on world map

3 min read

Exploring how HIPAA affects new communication technologies

New communication tools are changing healthcare but bring risks if patient privacy isn’t protected. Providers must ensure these technologies align...

Read More
Image of gavel for blog about The difference between civil and criminal HIPAA penalties

2 min read

The difference between civil and criminal HIPAA penalties

While both civil and criminal penalties aim to uphold the integrity of HIPAA, the primary difference lies in intent and enforcement. Civil penalties...

Read More
Image of lock for blog about A guide to responding and reporting data breaches

3 min read

A guide to responding and reporting data breaches

Responding to and reporting a data breach is a responsibility that requires prompt action, transparency, and adherence to regulatory requirements. By...

Read More
Image of federal office building for blog about Chinese hackers target U.S. Treasury Department

2 min read

Chinese hackers target U.S. Treasury Department

State-sponsored Chinese hackers breach U.S. Treasury systems, exposing vulnerabilities in government cybersecurity.

Read More