The HIPAA implications of using blockchain for secure patient data management

2 min read

HIPAA implications of using blockchain

Blockchain, a technology that stores information like electronic health records (EHRs) in blocks, can help organizations securely manage patient data. Blockchain is decentralized, enhancing data integrity, security, and transparency. It aligns with...

Read More
Inventory optimization in healthcare practices

1 min read

Inventory optimization in healthcare practices

Inventory optimization is the strategic planning surrounding the management of medical supplies to minimize cost and waste.

Read More
What is the use of blockchain in EHRs?

2 min read

What is the use of blockchain in EHRs?

In healthcare, a blockchain is a database of health information stored in blocks, making it more secure. In 2022, the healthcare industry further...

Read More
What is a HIPAA disaster recovery plan?

3 min read

What is a HIPAA disaster recovery plan?

A HIPAA disaster recovery plan details procedures for restoring any data loss resulting from a disaster. It ensures the security and availability of...

Read More
Ransomware attacks increase: $460 million paid in H1 2024

2 min read

Ransomware attacks increase: $460 million paid in H1 2024

Recent findings reveal increased ransomware attacks and profitability, raising concerns about current cybersecurity measures.

Read More
Are subcontractors business associates under HIPAA?

2 min read

Are subcontractors business associates under HIPAA?

Subcontractors can be considered business associates under HIPAA if they handle protected health information (PHI) as part of their services. If the...

Read More
What are living off the land attacks?

2 min read

What are living off the land attacks?

Living off the land attacks are when hackers use built-in tools and software already present on a computer to carry out malicious activities...

Read More
Researcher sued for sharing data leaked in Columbus ransomware attack

2 min read

Researcher sued for sharing data leaked in Columbus ransomware attack

The City of Columbus, Ohio, has filed a lawsuit against cybersecurity researcher David Leroy Ross, also known as Connor Goodwolf. The lawsuit accuses...

Read More
What is tokenization?

4 min read

What is tokenization?

Tokenization substitutes sensitive data with unique, randomized tokens without a mathematical relationship to the original information. These tokens...

Read More
Change Healthcare breach exposes gaps in healthcare cybersecurity

4 min read

Change Healthcare breach exposes gaps in healthcare cybersecurity

The ransomware attack on Change Healthcare in February 2024 revealed the vulnerabilities within the sector and the serious consequences of such...

Read More
Analysis of the 2024 Verizon data breach investigation report

3 min read

Analysis of the 2024 Verizon data breach investigation report

The Verizon Data Breach Investigations Report (DBIR) has long been a trusted resource for security professionals, offering an analysis of the latest...

Read More
Can a covered entity send ePHI through an unsecured app?

2 min read

Can a covered entity send ePHI through an unsecured app?

A covered entity can only send electronic protected health information (ePHI) through an unsecured app if a patient requests it. If a patient asks to...

Read More
Everest ransomware group targeting healthcare industry

2 min read

Everest ransomware group targeting healthcare industry

Everest, a Russian-speaking ransomware group, has targeted entities like NASA and the Brazilian government. Now, they're focusing on the healthcare...

Read More