Updating your HIPAA documentation

2 min read

Updating your HIPAA documentation

As HIPAA rules are periodically updated to address new challenges and technologies, maintaining current documentation helps avoid costly penalties and legal issues associated with HIPAA violations. It also ensures that security measures are...

Read More
HIPAA and email deletion rules

3 min read

HIPAA and email deletion rules

HIPAA requires that emails containing protected health information (PHI) be securely managed, retained, and deleted to prevent unauthorized access...

Read More
What is the Emergency Medical Treatment and Labor Act (EMTALA)?

3 min read

What is the Emergency Medical Treatment and Labor Act (EMTALA)?

The healthcare industry in the United States has transformed over the years, focusing on ensuring equitable access to emergency medical care...

Read More
Texas Attorney General sues Biden Administration over HIPAA Privacy Rule

4 min read

Texas Attorney General sues Biden Administration over HIPAA Privacy Rule

Texas Attorney General Ken Paxton is suing the Biden administration, claiming HIPAA Privacy Rule regulations hinder state law enforcement...

Read More
Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

1 min read

Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

Planned Parenthood has become the latest target in a recent ransomware attack in its Montana branch.

Read More
What do you need to meet HIPAA standards?

3 min read

What do you need to meet HIPAA standards?

To meet HIPAA standards when dealing with protected health information (PHI), you need a comprehensive framework that covers multiple aspects of your...

Read More
Cyber fire drills for healthcare cybersecurity

3 min read

Cyber fire drills for healthcare cybersecurity

Despite cybersecurity policies and employee training programs, healthcare organizations frequently fall victim to cyberattacks. Organizations must...

Read More
What is intent based networking?

1 min read

What is intent based networking?

Intent-based networking is a form of network management that uses machine learning and automation.

Read More
What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher...

Read More
HHS-OIG: Improving cloud security controls 

3 min read

HHS-OIG: Improving cloud security controls

Cloud computing is now a fundamental aspect of modern business operations, making the security and protection of cloud-based systems more necessary...

Read More
Lawsuit filed after the Kootenai Health data breach

2 min read

Lawsuit filed after the Kootenai Health data breach

Kootenai Health is facing a federal class-action lawsuit for allegedly failing to protect sensitive patient information. After the breach, some...

Read More
What is cybersquatting?

2 min read

What is cybersquatting?

Cybersquatters buy or register domain names that are identical or confusingly similar to trademarks, business names, or personal names. They usually...

Read More
Healthcare Cybersecurity Act introduced to the House of Representatives

1 min read

Healthcare Cybersecurity Act introduced to House of Representatives

The new act, a companion to an act introduced to the Senate, hopes to improve healthcare cybersecurity by increasing government partnerships and more.

Read More