orange digital security lock

3 min read

Documenting a data breach under HIPAA regulations

Documenting a data breach while adhering to HIPAA regulations involves following specific steps to ensure compliance, minimize harm, and demonstrate accountability.

Read More
email icons on red background

1 min read

Study: 80% of organizations faced email breaches in the last year

A recent study reveals that 80% of critical infrastructure organizations fell victim to email-related security breaches last year.

Read More
library of congress

1 min read

Library of Congress email systems breached in a cyberattack

The Library of Congress was hacked earlier in 2024 by adversaries. The attack was targeted against the organization's email accounts.

Read More
Image of emergency contact form for blog about HIPAA compliant approaches for reaching emergency contacts

2 min read

HIPAA compliant approaches for reaching emergency contacts

HIPAA allows contacting a patient’s emergency contact or family members in situations where the patient is unable to consent, using professional...

Read More
Image of shield for blog about What to know about the Orthopedics Rhode Island data breach 

3 min read

What to know about the Orthopedics Rhode Island data breach 

On November 6, 2024, Orthopedics Rhode Island, Inc. (“Ortho RI”) reported a data breach involving sensitive patient information. The healthcare...

Read More
Image of someone on their phone for blog about Social media HIPAA violation series: Grady Hospital - Facebook posts

3 min read

Social media HIPAA violations: Grady Hospital and Facebook posts

A paramedic’s posts in a controversial Facebook group uncovered serious breaches of patient privacy and ethical conduct, leading to disciplinary...

Read More
US mission to the UN logo seal

1 min read

Global leaders unite to combat ransomware attacks on healthcare systems

A joint statement by the United States Mission to the United Nations was released in November 2024, calling for countries to take action against...

Read More
Image of someone typing for blog about Balancing real-time messaging and documentantion requirements under HIPAA

2 min read

Balancing real-time messaging and documentantion requirements

Real-time messaging and documentation can simplify communication, improve care coordination, and ensure accurate, up-to-date patient records,...

Read More
Image of phones for blog about Notifying patients of provider availability changes

2 min read

Notifying patients of provider availability changes

Healthcare practices should notify patients of provider availability changes through HIPAA compliant communication channels, such as encrypted email,...

Read More
Image of people on their phones for blogs about Social media HIPAA violations

4 min read

Social media HIPAA violations

In the first half of 2018 alone, more than 56% of the 4.5 billion compromised data records were tied to social media incidents. These breaches can...

Read More
blue digital lock

2 min read

What is RSA encryption?

Rivest-ShamirAldeman (RSA) is one of the most widely used security methods for protecting sensitive information. Named after its inventors, Ron...

Read More
Image of someone on their phone for blog about How to maintain HIPAA compliance when patients share PHI through social media

3 min read

Maintaing HIPAA compliance when patients share PHI over social media

To maintain HIPAA compliance when patients send protected health information (PHI) via social media, respond without disclosing PHI and direct them...

Read More
pad and pencil with stethoscope HIPAA text

2 min read

The HIPAA contact and resource guide 

Understanding HIPAA compliance can be challenging, especially when verifying privacy and security or reporting potential violations. Whether you're a...

Read More