An image of several file folders for a blog about what is a designated record set

2 min read

What is a designated record set

A designated record set is a collection of records used to make decisions related to patient care. The record also provides patients with access to their health information.

Read More
An image of a person texting for a blog about can you text PHI internally?

2 min read

Can you text PHI internally?

Texting protected health information (PHI) internally within a healthcare organization is generally discouraged unless it complies with HIPAA...

Read More
Image of someone texting for a blog about what is text bombing?

4 min read

What is text bombing?

Text bombing is a type of cyber harassment where someone sends a large number of unsolicited text messages to a target's phone in a short period....

Read More
Graphic of multiple envelopes for a blog about keeping auto-responses HIPAA compliant

2 min read

Keeping auto-responses HIPAA compliant

Healthcare organizations must ensure they do not share protected health information (PHI) in automatic reply messages to comply with HIPAA...

Read More
Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More
Image of shield for blog on top identity threats facing healthcare organizations

4 min read

Top identity threats facing healthcare organizations

Identity has become a major target for cybercriminals, affecting organizations of all sizes, and particularly healthcare. High-profile incidents like...

Read More
Image of someone touching a digital screen for blog post on Regulating AI in healthcare

4 min read

Regulating AI in healthcare

Artificial intelligence (AI) has quickly transformed many industries, and healthcare is no exception. Along with the benefits, there are growing...

Read More
Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021...

Read More
Is it against HIPAA to give results over the phone?

2 min read

Is it against HIPAA to give results over the phone?

No, it is not necessarily against HIPAA to give results over the phone. Still, it requires careful adherence to specific guidelines. Healthcare...

Read More
Can HIPAA violations lead to termination?

3 min read

Can HIPAA violations lead to termination?

HIPAA violations can have serious consequences for both healthcare organizations and individual employees. The severity of a violation, along with...

Read More
How HIPAA gives patients control over health information

2 min read

How HIPAA gives patients control over health information

HIPAA gives patients greater control over health information through several provisions. These include the rights to access, consent, privacy,...

Read More
NIST takes a stand against nonsensical password rules

2 min read

NIST takes a stand against nonsensical password rules

The National Institute of Standards and Technology (NIST) is pushing to eliminate outdated password rules in a sweeping overhaul to enhance security...

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More