Image of lock for blog about What are strong security practices?

2 min read

What are strong security practices?

Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are especially useful for email account security.

Read More
Image of lock for blog about The impact of the CMS proposed rule on the authorization process 

2 min read

The impact of the CMS proposed rule on the authorization process

Prior authorization (PA) is a process where healthcare providers must obtain approval from insurers before delivering specific treatments or...

Read More
Image of shield for blog about What are HIPAA audit controls?

2 min read

What are HIPAA audit controls?

HIPAA audit controls refer to the mechanisms and policies covered entities and business associates implement to track and monitor access to...

Read More
Image of locked computer for blog about Access control vs Audit control

2 min read

Access controls vs Audit controls

Access control ensures that only authorized users can interact with systems and data, while audit control provides visibility and accountability...

Read More
Image of business meeting for blog about The HIPAA compliant way to engage stakeholders

2 min read

The HIPAA compliant way to engage stakeholders

Engaging stakeholders in a HIPAA compliant manner involves safeguarding protected health information (PHI) while encouraging collaboration among...

Read More
red digital lock

1 min read

Amergis Healthcare Staffing email breach affects over 10K

On November 18, 2024, Amergis Healthcare Staffing, Inc., formerly Maxim Healthcare Staffing, filed a notice of data breach with the Attorney General...

Read More
Image of Word file for blog about New phishing campaign exploits corrupted Word documents

2 min read

New phishing campaign exploits corrupted Word documents

A new phishing campaign uses corrupted Word documents to evade detection and steal credentials.

Read More
Image of Senate chamber for blog about What is the SAVE Act?

2 min read

What is the SAVE Act?

Over the past two years, healthcare employees have faced increased threats and assaults, further compounded by the stress and resource constraints of...

Read More
goodrx logo

2 min read

GoodRx agrees to pay $25 million settlement over privacy lawsuit

GoodRx has agreed to a $25 million preliminary settlement in a class-action lawsuit alleging the company shared sensitive user information with third...

Read More
hand filling out form with laptop in background

2 min read

HIPAA attestation form introduced to protect reproductive health care data

A new HIPAA attestation form was introduced to bolster privacy protections for reproductive health care data.

Read More
veterans affairs logo

2 min read

VHA data breach exposes PHI of more than 2,300 veterans

On December 3, 2024, the Veterans Health Administration (VHA) reported a cybersecurity attack on a vendor’s server, potentially exposing the...

Read More
clipboard list

2 min read

How an incidence response plan supports HIPAA compliance

An incident response plan (IRP) supports HIPAA compliance by providing a structured framework to manage security incidents effectively.

Read More
Image of person using touch screen technology for blog about Why AI could fuel more data breaches in healthcare

5 min read

Why AI could fuel more data breaches in healthcare

Healthcare has seen a big rise in data breaches over the past few years, and it's becoming a concern for security professionals and organizations....

Read More