mālama i ke ola health center logo image for post Maui health center hit by ransomware attack

1 min read

Maui health center hit by ransomware attack

Mālama I Ke Ola Health Center experienced a security incident resulting in unauthorized access.

Read More
Governor Tim Walz for post VA employees improperly accessed medical records of both VP candidates

2 min read

VA employees improperly accessed medical records of both VP candidates

At least a dozen employees at the U.S. Department of Veterans Affairs (VA) improperly accessed the medical records of two vice presidential nominees,...

Read More
woman sitting on laptop for post Online psychotherapy's promise and perils

2 min read

Online psychotherapy's promise and perils

The digital era rebooted our perceptions about health, and psychotherapy online has become a mainstream alternative, benefiting patients and...

Read More
t-mobile logo for post U.S. and T-Mobile agree to a $31.5 million data breach settlement

2 min read

U.S. and T-Mobile agree to a $31.5 million data breach settlement

T-Mobile has agreed to a $31.5 million settlement with the FCC in response to data breaches that affected millions of U.S. consumers over a...

Read More
chart on paper with magnifying glass for post Understanding HIPAA healthcare statistics

3 min read

Understanding HIPAA healthcare statistics

The HIPAA Privacy Rule mandates security standards for HIPAA-covered entities to protect patient information and promote cybersecurity policies....

Read More
An image of several file folders for a blog about what is a designated record set

2 min read

What is a designated record set

A designated record set is a collection of records used to make decisions related to patient care. The record also provides patients with access to...

Read More
An image of a person texting for a blog about can you text PHI internally?

2 min read

Can you text PHI internally?

Texting protected health information (PHI) internally within a healthcare organization is generally discouraged unless it complies with HIPAA...

Read More
Image of someone texting for a blog about what is text bombing?

4 min read

What is text bombing?

Text bombing is a type of cyber harassment where someone sends a large number of unsolicited text messages to a target's phone in a short period....

Read More
Graphic of multiple envelopes for a blog about keeping auto-responses HIPAA compliant

2 min read

Keeping auto-responses HIPAA compliant

Healthcare organizations must ensure they do not share protected health information (PHI) in automatic reply messages to comply with HIPAA...

Read More
Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More
Image of shield for blog on top identity threats facing healthcare organizations

4 min read

Top identity threats facing healthcare organizations

Identity has become a major target for cybercriminals, affecting organizations of all sizes, and particularly healthcare. High-profile incidents like...

Read More
Image of someone touching a digital screen for blog post on Regulating AI in healthcare

4 min read

Regulating AI in healthcare

Artificial intelligence (AI) has quickly transformed many industries, and healthcare is no exception. Along with the benefits, there are growing...

Read More
Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021...

Read More