CISA unveils new reporting portal for threat response 

2 min read

CISA unveils new reporting portal for threat response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are reported.

Read More
CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

2 min read

CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

A faulty software update from cybersecurity firm CrowdStrike is under scrutiny as the company prepares to testify before Congress. Lawmakers try to...

Read More
Lessons learned from the CMS and WPS MOVEit cyberattack

3 min read

Lessons learned from the CMS and WPS MOVEit cyberattack

In May 2023, a vulnerability was discovered in the MOVEit software, a third-party file transfer application developed by Progress Software. This...

Read More
How a phishing scam took over my phone and how I recovered

3 min read

How a phishing scam took over my phone and how I recovered

On September 6, 2024, I received what seemed to be a routine text message about a delivery I was expecting.The message, supposedly from The Courier...

Read More
Disclosing a minor's PHI

3 min read

Disclosing a minor's PHI

Disclosing a minor’s PHI involves careful consideration of both HIPAA regulations and state-specific laws. While parents generally have the right to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More
HIPAA compliance in patient-generated health data (PGHD)

3 min read

HIPAA compliance in patient-generated health data (PGHD)

Healthcare providers can ensure HIPAA compliance when handling patient-generated health data (PGHD) by treating it as protected health information...

Read More
Protecting patient privacy in the opioid crisis

2 min read

Protecting patient privacy in the opioid crisis

Addressing the opioid crisis while staying HIPAA compliant is a delicate balance, but it’s one that healthcare providers must master if we’re ever...

Read More
PHI sharing in multi-agency services collaboration

2 min read

PHI sharing in multi-agency services collaboration

Multi-agency services in healthcare bring together different health and social service experts to provide comprehensive care to patients. By working...

Read More
What is a database?

4 min read

What is a database?

A database is an organized collection of structured information or data stored electronically in a computer system. It is usually controlled by a...

Read More
What is a business associate agreement?

3 min read

What is a business associate agreement?

A business associate agreement (BAA) is a legally binding contract establishing a relationship between a covered entity under the Health Insurance...

Read More
CMS to notify 946,801 impacted by MOVEit data breach

2 min read

CMS to notify 946,801 impacted by MOVEit data breach

The Centers for Medicare & Medicaid Services (CMS) and Wisconsin Physicians Service Insurance Corporation (WPS) are notifying nearly 946,801...

Read More
The purpose of duty to warn in therapy

3 min read

The purpose of duty to warn in therapy

While therapy is built on a foundation of trust and confidentiality, therapists must sometimes disclose information in the interest of public safety....

Read More