hospital heart monitor

1 min read

Backdoor threat found in widely used patient monitors

What’s new The Cybersecurity and Infrastructure Security Agency (CISA) has identified a backdoor in the firmware of Contec CMS8000 patient monitors, devices widely used in healthcare settings to monitor vital signs such as heart rate, blood...

Read More
legal employees at a desk

2 min read

Does HIPAA allow a Power of Attorney to see mental health records?

Generally, yes. A Health Care Power of Attorney grants a trusted individual access to medical and mental health records under the Health Insurance...

Read More
Image of computer for blog about Why small healthcare practices are at greater risk for cyberattacks

3 min read

Why small healthcare practices are at greater risk for cyberattacks

Small healthcare practices often face unique challenges that make them particularly vulnerable to cyberattacks. Despite having fewer resources than...

Read More
Image of someone using a calculator for blog about Cyberattacks are driving businesses toward insolvency

3 min read

Cyberattacks are driving businesses toward insolvency

Cyberattacks are creating huge financial burdens for businesses, with breach-related costs, legal challenges, and operational disruptions forcing...

Read More
wix logo

1 min read

Is Wix HIPAA compliant? (2025 update)

Based on our research, Wixis not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
provider with floating medical icons

3 min read

How employee training helps prevent email breaches

Staff training can prevent disclosure of protected health information (PHI) through email. A strong training program educates employees about PHI...

Read More
amplitude logo

1 min read

Is Amplitude Analytics HIPAA compliant? (2025 update)

Based on our research, Amplitude Analytics is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and...

Read More
law gavel book and scale

3 min read

When can state laws can override federal privacy protections?

The HIPAA Privacy Rule is a federal baseline for safeguarding individuals'protected health information (PHI).

Read More
hands on laptops

3 min read

Evaluating the effectiveness of employee awareness training

Employee awareness training verifies that staff are aware of the HIPAA Act and adhere to its guidelines. Supporting a training program with an...

Read More
paperwork with stethoscope

2 min read

Treatment, health care operations, and marketing under HIPAA

According to the U.S. Department of Health and Human Services (HHS) Health Information Privacy page, “the overlap among common usages of the terms...

Read More
Image of someone checking an email for blog about How to verify an email recipient

1 min read

How to verify an email recipient

95% of cyberattacks are due to human error, including sending emails to the wrong recipient. This statistic demonstrates the need for healthcare...

Read More
digital globe

2 min read

A deep dive into nation-state cyber actors and their tactics

Cyber warfare has become a major part of geopolitical strategies, with nation-state actors using cyberattacks for espionage, financial gain, and...

Read More
google workspace logo

2 min read

Is Google Workspace HIPAA compliant? (2025 update)

Based on our research, Google Workspace can be HIPAA compliant if properly configured, but it has limitations that may pose risks when handling...

Read More