cellphone tower with red

2 min read

Chinese cyber-espionage group hacks at least 8 major US telecom networks

What happened Salt Typhoon, a Chinese cyber-espionage group, allegedly infiltrated at least eight US telecommunications firms, stealing large volumes of call record metadata. During an interview with The Guardian, a senior US official stated the...

Read More
stethoscope with computer data

2 min read

Why healthcare organizations are common targets for data breaches

The motive behind a data breach is often reflected in the financial, ideological, and strategic interests of threat actors.It is especially financial...

Read More
laptop with lung xray, tablet with body scan and stethoscope on surface

2 min read

Aligning clinical trial innovation with HIPAA standards

Clinical trial enrollment is often more driven by sociodemographic factors rather than clinical factors, making it difficult to obtain a diverse pool...

Read More
Image of congress room for blog about What providers must know about the new cybersecurity Senate Bill

2 min read

What providers should know about the new cybersecurity Senate Bill

The U.S. Senate has introduced the Health Care Cybersecurity and Resiliency Act of 2024, a bipartisan effort aimed at enhancing cybersecurity in the...

Read More
Image of two people holding hands for blog about HIPAA email for end-of-life care

3 min read

HIPAA email for end-of-life care

End-of-life care conversations are important yet sensitive, allowing patients and their families to make informed decisions during difficult times....

Read More
Image of lock for blog about Massive data breach exposes 34,000 patients' PHI

1 min read

Massive data breach exposes 34,000 patients' PHI

The HHS announced a $1.19 million penalty against Gulf Coast Pain Consultants, LLC for multiple violations of the HIPAA Security Rule.

Read More
Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These...

Read More
laptop with ransomware text

1 min read

Nearly 30K exposed in Colonial Behavioral Health ransomware attack

Colonial Behavioral Health (CBH), a Virginia-based healthcare services provider, announced a data breach on November 27, 2024, following a ransomware...

Read More
provider and patient hands

3 min read

HIPAA compliant communication in patient-centered care

Patient-centered care is a comprehensive care model that focuses on the patient’s symptoms, medical history, emotional, social, and financial factors...

Read More
Image of WiFi symbol for blog about Russian hackers exploit WiFi to breach US firm using nearest-neighbor attack

2 min read

Russian hackers exploit WiFi using nearest-neighbor attack

Russian hackers used a ‘nearest-neighbor attack’ through WiFi to breach a US company, trying to infiltrate Ukraine-related projects.

Read More
Image of vaccine and needle for blog about Social media HIPAA violation series: Texas Children's Hospital - Vaccination controversy

2 min read

Social media HIPAA violations: Texas Hospital vaccination controversy

A nurse’s social media post about a pediatric measles patient led to her termination and showcased the risks of sharing patient information online.

Read More
Image of camera for blog about Can healthcare providers allow media in treatment areas?

2 min read

Can healthcare providers allow media in treatment areas?

Healthcare providers cannot invite or arrange for members of the media, including film crews, to enter treatment areas of their facilities without...

Read More
blue yonder logo

1 min read

Blue Yonder data breach exposes supply chain vulnerabilities

Blue Yonder experienced a data breach, compromising its operations and potentially clients relying on the supply chain management solution.

Read More