Image of puzzle for blog about HIPAA compliant communication during mergers

2 min read

HIPAA compliant communication during mergers

Healthcare mergers and acquisitions often involve transferring sensitive patient information between entities. Ensuring HIPAA compliance during this process protects patient privacy and avoids regulatory penalties.

Read More
Image of network for blog about The role of VPNs in data encryption 

2 min read

The role of VPNs in data encryption 

Data encryption is the process of protecting information from unauthorized access. When data is encrypted, it is changed from a readable format...

Read More
Image of someone on a computer for blog about Understanding anti-malware protection

2 min read

Understanding anti-malware protection

With the prevalence of cyber threats, anti-malware protections serve as a frontline defense against malicious software that can disrupt services....

Read More
Image of lock for blog about How DNSSEC works and why it matters

2 min read

How DNSSEC works and why it matters

The Domain Name System (DNS) acts like the internet’s address book, translating domain names into IP addresses. Traditional DNS has no built-in...

Read More
Image of someone on a computer for blog about U.S. Army soldier arrested for alleged role in hacking incident

3 min read

U.S. Army soldier arrested for alleged role in hacking incident

A U.S. Army communications specialist was arrested in Texas for allegedly leaking presidential call logs and hacking telecommunications firms as part...

Read More
Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More
Image of laptop for blog about What are technology-neutral standards? 

1 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of two people shaking hands for blog about Mergers and HIPAA

2 min read

Mergers and HIPAA

Mergers in the healthcare industry can significantly impact compliance with the Health Insurance Portability and Accountability Act (HIPAA). While...

Read More
law gavel and scale

2 min read

Elgon Information Systems to pay $80,000 for ransomware breach

The HHS Office for Civil Rights (OCR) issued its first HIPAA enforcement action of 2025, settling on a $80,000 penalty on Elgon Information Systems...

Read More
red computer data lines

2 min read

The role of Google's Red Team in securing AI development

Google's Red Team represents a major component in the company's approach to AI security, working to identify and address potential vulnerabilities...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
red data background with lock

1 min read

22K consumers affected by In-Home Attendant Services breach

Texas-based healthcare provider In-Home Attendant Services, Ltd. recently reported that a data breach affected 22,000 consumers, exposing their...

Read More
smartphone sitting on world map

3 min read

Exploring how HIPAA affects new communication technologies

New communication tools are changing healthcare but bring risks if patient privacy isn’t protected. Providers must ensure these technologies align...

Read More