FBI flyer seeking shooting suspect

2 min read

Suspect arrested in targeted killing of UnitedHealthcare CEO

Luigi Mangione, the suspected gunman in the targeted killing of UnitedHealthcare CEO Brian Thompson, was arrested in Pennsylvania after a five-day manhunt.

Read More
Image of shield for blog about 8 lessons from the Change Healthcare ransomware attack

3 min read

8 lessons from the Change Healthcare ransomware attack

The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group (UHG), has shown the vulnerabilities in healthcare...

Read More
Individual in hood for blog about Cyberattack on Anna Jaques Hospital exposes vulnerabilities, affects 316,000 individuals

2 min read

Cyberattack on hospital affects 316,000 people

A cyberattack on Anna Jaques Hospital, identified during the 2023 holiday season, breached the sensitive data of 316,000 individuals.

Read More
image of medical records for blog about The HITECH Act and the Meaningful Use program

2 min read

Understanding the Meaningful Use program

Meaningful Use refers to standards established by the Centers for Medicare and Medicaid Services (CMS) to encourage healthcare organizations to use...

Read More
Inmediata logo

2 min read

Inmediata breach exposes 1.6M patients' data causing $250K settlement

Inmediata Health Group has agreed to a $250,000 settlement for HIPAA violations. The settlement follows a 2019 data breach that exposed the personal...

Read More
Image of nurse taking notes for blog about What is the difference between

2 min read

What is the difference between use and disclosure of PHI?

The key difference between "use" and "disclosure" of PHI lies in whether the information is shared internally within the same organization (use) or...

Read More
Image of laptop for blog about The issue with EHR vendor lock-in

2 min read

The issue with EHR vendor lock-in

When an Electronic health record (EHR) system is not flexible or interoperable with other tools, healthcare providers can have difficulty sharing...

Read More
Image of workplace for blog about Handling PHI when reporting workplace violence

1 min read

Handling PHI when reporting workplace violence

When evidence used in workplace violence (WPV) reports contains identifiable details about a patient that could link them to the organization and the...

Read More
Image of someone sharing ideas with another person for blog about Using empathetic language in weight-related discussions

2 min read

Using empathetic language in weight-related discussions

Empathetic language is the art of using words to show understanding and care for another person’s feelings. According to a study published in the...

Read More
red digital shield

1 min read

Center for Vein Restoration reports data breach affecting over 445,000

The Center for Vein Restoration (CVR), a Maryland-based clinic, disclosed a major data breach impacting the protected health information (PHI) of...

Read More
HealthAlliance

2 min read

HealthAlliance fined $550K for cybersecurity oversight

New York healthcare provider HealthAlliance was ordered to pay $550,000 for failing to address a known cybersecurity vulnerability, resulting in a...

Read More
Image of checkboxes and target for blog about How do organizations monitor HIPAA compliance?

2 min read

How do organizations monitor HIPAA compliance?

Monitoring HIPAA compliance is a continuous process that requires a proactive and systematic approach. From implementing policies to conducting...

Read More
Image of lock for blog about What are strong security practices?

2 min read

What are strong security practices?

Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are...

Read More