What are the HIPAA rules for video conferencing?

2 min read

What are the HIPAA rules for video conferencing?

The HIPAA rules for video conferencing in teletherapy require that any platform used has encryption, secure user authentication, and safe data storage to protect protected health information (PHI). Additionally, therapists must obtain a business...

Read More
Higher HIPAA penalties announced

3 min read

Higher HIPAA penalties announced

Violating HIPAA rules is now more expensive, as penalty fines will increase due to inflation adjustments recently announced by the Department of...

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
CISA unveils new reporting portal for threat response 

2 min read

CISA unveils new reporting portal for threat response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are...

Read More
CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

2 min read

CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

A faulty software update from cybersecurity firm CrowdStrike is under scrutiny as the company prepares to testify before Congress. Lawmakers try to...

Read More
Lessons learned from the CMS and WPS MOVEit cyberattack

3 min read

Lessons learned from the CMS and WPS MOVEit cyberattack

In May 2023, a vulnerability was discovered in the MOVEit software, a third-party file transfer application developed by Progress Software. This...

Read More
How a phishing scam took over my phone and how I recovered

3 min read

How a phishing scam took over my phone and how I recovered

On September 6, 2024, I received what seemed to be a routine text message about a delivery I was expecting.The message, supposedly from The Courier...

Read More
Disclosing a minor's PHI

3 min read

Disclosing a minor's PHI

Disclosing a minor’s PHI involves careful consideration of both HIPAA regulations and state-specific laws. While parents generally have the right to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More
HIPAA compliance in patient-generated health data (PGHD)

3 min read

HIPAA compliance in patient-generated health data (PGHD)

Healthcare providers can ensure HIPAA compliance when handling patient-generated health data (PGHD) by treating it as protected health information...

Read More
Protecting patient privacy in the opioid crisis

2 min read

Protecting patient privacy in the opioid crisis

Addressing the opioid crisis while staying HIPAA compliant is a delicate balance, but it’s one that healthcare providers must master if we’re ever...

Read More
PHI sharing in multi-agency services collaboration

2 min read

PHI sharing in multi-agency services collaboration

Multi-agency services in healthcare bring together different health and social service experts to provide comprehensive care to patients. By working...

Read More
What is a database?

4 min read

What is a database?

A database is an organized collection of structured information or data stored electronically in a computer system. It is usually controlled by a...

Read More