Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as healthcare practices use many different tools. Healthcare organizations that need to protect protected...

Read More
open lock with computer code

1 min read

More than 10,000 affected in Connecticut GI breach

On December 2, 2024, Connecticut GI and Gastroenterology Associates of Fairfield reported a data breach involving the theft of 10,568 patients’...

Read More
childrens hospital colorado logo

1 min read

Children’s Hospital Colorado fined $548K for HIPAA violations

Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.

Read More
blue digital check boxes

3 min read

Do you need a dedicated HIPAA compliance officer?

While organizations have flexibility in structuring their compliance functions, having dedicated HIPAA compliance staff can help ensure ongoing...

Read More
legal scale with cash

2 min read

$8.9M settlement reached in Elekta and NMH data breach affect

Elekta Inc. and Northwestern Memorial Healthcare recently agreed to an $8.9 million settlement after a 2021 ransomware attack compromised the...

Read More
digital locks on red blocks

3 min read

Types of data breaches

What is a data breach? Data breaches occur when sensitive, confidential, or protected information is accessed or disclosed without proper...

Read More
Image of blocks for blog about Scalability and patient engagement

2 min read

Scalability and patient engagement

Enhancing scalability in patient engagement facilitates efficient, consistent, and personalized care. Making sure your organization is scaling up as...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
atrium health logo

2 min read

Atrium Health notifies HHS of data breach impacting over 585,000

Atrium Health has disclosed a data breach affecting over 585,000 individuals, linked to third-party tracking technologies on its patient portal.

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

2 min read

The uses of control analyses in email

Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...

Read More
Image of someone analyzing data for blog about Do forensic firms need to be HIPAA compliant? 

2 min read

Do forensic firms need to be HIPAA compliant? 

Forensic firms are mostly responsible for analyzing the systems of organizations extensively, usually following a data breach. Through their work,...

Read More
Image of thumbs up and down for blog about Social media HIPAA violation series: Twitter disclosure

2 min read

Social media HIPAA violation series: Twitter disclosure

A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...

Read More
Image of hands for blog about What is the role of social awareness in mental health communications?

2 min read

What is the role of social awareness in mental health communications?

Social awareness is the ability to recognize and understand the emotions, thoughts, and perspectives of others. The concept is often reflected in how...

Read More