Image of gavel for blog about Understanding HIPAA violations: Examples, penalties, and lessons learned

4 min read

Understanding HIPAA violations: Penalties, and lessons learned

The Health Insurance Portability and Accountability Act (HIPAA) is fundamental in protecting patient information across U.S. healthcare. Since its establishment in 1996, HIPAA has focused on simplifying healthcare management, reducing fraud, and...

Read More
Image of books for blog about Are educational email campaigns part of marketing?

2 min read

Are educational email campaigns part of marketing?

Yes, educational email campaigns are an integral part of marketing. These campaigns focus on providing valuable information to the audience, building...

Read More
Image of lock for blog about A look at 2024’s healthcare cybersecurity challenges 

3 min read

2024's biggest cybersecurity challenges

According to the American Hospital Association (AHA), healthcare cybersecurity is under unprecedented strain in 2024, with 386 breaches reported so...

Read More
caduceus

2 min read

Is information blocking a violation?

Information blocking refers to the practices used by healthcare providers and health IT developers that intentionally interfere with the access and...

Read More
diabetes device in arm with smartphone app

2 min read

Should remote monitoring technologies be HIPAA compliant?

Yes, remote monitoring technologies (RMTs) should be HIPAA compliant.

Read More
Image of data to represent AI for blog about HHS issues guidelines to ensure fair and secure use of AI in healthcare

3 min read

HHS issues guidance to ensure fair and secure use of AI in healthcare

The HHS Office for Civil Rights has issued guidance to healthcare entities on responsibly using AI tools, emphasizing compliance with...

Read More
smartphone with red location pin

1 min read

Millions of smartphone users location data stolen in major hack

The attack is estimated to impact hundreds of companies and millions of smartphone users.

Read More
Image of scale for blog about What is ECCS?

2 min read

What is ECCS?

Ethical compliance and conduct standards (ECCS) outline acceptable behaviors and practices for staff. An International Journal of Research in...

Read More
Image of lock for blog about Chinese hackers breached more U.S. telecom companies

2 min read

Chinese hackers breached more U.S. telecom companies

Chinese state-sponsored hackers, Salt Typhoon, have ramped up cyberattacks on U.S. telecom companies, compromising sensitive communications and...

Read More
Image of data network for blog about What is the ethical management of PHI?

2 min read

What is the ethical management of PHI?

A Journal of Cybersecurity and Privacy states, “Ethics in data management can be defined as the principles and practices that guide the responsible...

Read More
Image of individual on a computer for blog about Medusind data breach from 2023 affects 360,000 individuals

2 min read

Medusind data breach from 2023 affects 360,000 individuals

Medusind, a medical and dental billing company recently disclosed a data breach discovered in December 2023 and exposed the personal and health...

Read More
email icon surrounded by people icons

2 min read

The shift from traditional HIPAA compliance training methods

Traditional compliance training methods have been characterized by their reliance on passive learning techniques like lengthy lectures, PowerPoint...

Read More
Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems,...

Read More