red people icons for post Network breach at Gándara Center exposes 17,000

1 min read

Network breach at Gándara Center exposes 17,000

On October 24, 2024, Gándara Center reported a data security breach that exposed theprotected health information (PHI)of current and former patients.

Read More
FTC logo for post FTC and HIPAA Breach Notification Rules: What's the difference?

3 min read

FTC and HIPAA Breach Notification Rules: What's the difference?

Health data stakeholders must distinguish between the Federal Trade Commission's (FTC) Health Breach Notification Rule and the Health Insurance...

Read More
digital lock for post Cybersecurity trends for 2024 and beyond

2 min read

Cybersecurity trends for 2025 and beyond

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...

Read More
hands over red lock on computer for post HHS Cyber Threat Intelligence announces major threat actors in 2024

2 min read

HHS Cyber Threat Intelligence announces major threat actors in 2024

On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...

Read More
globe with blue digital points for post The risk of AI-driven cyberattacks in healthcare

2 min read

The risk of AI-driven cyberattacks in healthcare

The rapid development of Artificial Intelligence (AI) opens the way for more sophisticated and focused cyberattacks. On October 23, 2024, at the...

Read More
Image of shield for blog about Preparing for HIPAA security updates

2 min read

Preparing for HIPAA security updates

At the recent joint HHS and National Institute of Standards and Technology security conference, HHS OCR senior advisor for health information...

Read More
red digital locks for post Over 161,000 impacted in Long Island Plastic Surgical Group cyberattack

2 min read

Over 161,000 impacted in Long Island Plastic Surgical Group cyberattack

Long Island Plastic Surgical Group, a network of 13 practices in New York, has confirmed that a network breach compromised the protected health...

Read More
texas capitol building for post Texas doctor challenges HHS over reproductive health privacy rule

2 min read

Texas doctor challenges HHS over reproductive health privacy rule

A physician in Texas has initiated a lawsuit against the Department of Health and Human Services (HHS) in an effort to halt enforcement of a recently...

Read More
Image of two people holding hands for blog about What are medical advance directives? 

1 min read

What are medical advance directives?

Medical advance directives allow another, trusted individual to make decisions in the event a person is incapable of making it themselves.

Read More
Individual typing for blog about Microsoft creates fake Azure tenants to combat phishing

2 min read

Microsoft creates fake Azure tenants to combat phishing

Microsoft has adopted an innovative approach to counter phishing attacks, effectively luring cybercriminals into carefully crafted honeypots by...

Read More
Image of two rings for article about HIPAA and divorce

3 min read

HIPAA and divorce

The Health Insurance Portability and Accountability Act (HIPAA) ensures the protection of protected health information (PHI) during divorce. It makes...

Read More
Image of key for blog about Why is encryption important for HIPAA compliance?

2 min read

Why is encryption important for HIPAA compliance?

Encryption is a powerful tool for securing patient information and meeting HIPAA’s requirements for protecting ePHI. While it may not be strictly...

Read More
How to know if you’re a covered entity

3 min read

How to know if you’re a covered entity

HIPAA defines certain entities as covered entities and imposes specific responsibilities to ensure compliance. If you are involved in the healthcare...

Read More