2 min read
Suspect arrested in targeted killing of UnitedHealthcare CEO
Luigi Mangione, the suspected gunman in the targeted killing of UnitedHealthcare CEO Brian Thompson, was arrested in Pennsylvania after a five-day manhunt.
Read More2 min read
Luigi Mangione, the suspected gunman in the targeted killing of UnitedHealthcare CEO Brian Thompson, was arrested in Pennsylvania after a five-day manhunt.
Read More3 min read
The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group (UHG), has shown the vulnerabilities in healthcare...
2 min read
A cyberattack on Anna Jaques Hospital, identified during the 2023 holiday season, breached the sensitive data of 316,000 individuals.
2 min read
Meaningful Use refers to standards established by the Centers for Medicare and Medicaid Services (CMS) to encourage healthcare organizations to use...
2 min read
Inmediata Health Group has agreed to a $250,000 settlement for HIPAA violations. The settlement follows a 2019 data breach that exposed the personal...
2 min read
The key difference between "use" and "disclosure" of PHI lies in whether the information is shared internally within the same organization (use) or...
2 min read
When an Electronic health record (EHR) system is not flexible or interoperable with other tools, healthcare providers can have difficulty sharing...
1 min read
When evidence used in workplace violence (WPV) reports contains identifiable details about a patient that could link them to the organization and the...
2 min read
Empathetic language is the art of using words to show understanding and care for another person’s feelings. According to a study published in the...
1 min read
The Center for Vein Restoration (CVR), a Maryland-based clinic, disclosed a major data breach impacting the protected health information (PHI) of...
2 min read
New York healthcare provider HealthAlliance was ordered to pay $550,000 for failing to address a known cybersecurity vulnerability, resulting in a...
2 min read
Monitoring HIPAA compliance is a continuous process that requires a proactive and systematic approach. From implementing policies to conducting...
2 min read
Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are...