Image of mouse and laptop for blog about What is rate limiting?

3 min read

What is rate limiting?

Rate limiting is a versatile technique employed to regulate the frequency of user or application interactions with a web property. It can protect organizations against malicious bot attacks, such as brute-force attempts, denial-of-service (DoS)...

Read More
Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files,...

Read More
Image of lock on keyboard for blog about Hackers face federal charges in billion-record data breach

2 min read

Hackers face federal charges in billion-record data breach

The US government has officially charged two hackers accused of stealing 50 billion customer records from AT&T and other major companies.

Read More
Image of phone and text boxes for blog about HIPAA compliant automated messaging for preventive care reminders

3 min read

HIPAA compliant automated messaging for preventive care reminders

Automated messaging can be used for HIPAA compliant preventive care reminders when the communication is directly related to the patient’s treatment,...

Read More
nursing home room with bed and wheelchair

2 min read

Are senior care facilities covered entities under HIPAA?

Not every senior care facility is a covered entity, but those that provide medical care and handle protected health information (PHI) must adhere to...

Read More
blue digital lock

2 min read

AAP hit by ransomware: Attackers demand double payment

A ransomware attack by Embargo has allegedly targeted American Associated Pharmacies (AAP). The attackers claim that AAP paid $1.3 million to regain...

Read More
Robert F. Kennedy Credit: Wikimedia Commons Gage Skidmore

1 min read

Trump picks Robert F. Kennedy Jr. to lead health department

Donald Trump announced his selection of Robert F. Kennedy as his nominee as the Secretary of the HHS.

Read More
Image of graph for blog about What is UBA software?

2 min read

What is UBA software?

Through continuous monitoring of user behavior, user behavior software (UBA) provides a layer of protection that complements existing security...

Read More
Image of puzzle for blog about What is business impact analysis?

2 min read

What is business impact analysis?

A business impact analysis is the first step in an effective cybersecurity policy. During the process, organizations will analyze their security...

Read More
Image of lock for blog about Cyber threat trends for OT and ICS networks

1 min read

Cyber threat trends for OT and ICS networks

Cyberattacks are shifting focus to industrial systems, with new threats targeting OT and ICS networks.

Read More
Face@Gene logo

2 min read

How facial recognition technology is changing healthcare privacy

Facial recognition technology (FRT) is transforming healthcare with applications that promise earlier diagnoses and more personalized treatments. New...

Read More
white checkmark over digital blue background

3 min read

Handling medical record corrections and amendments under HIPAA

Healthcare providers should handle medical record amendments by accepting written requests from patients, securely documenting each request, and...

Read More
digital concept of medical communications plan

4 min read

Communication policies that align with HIPAA regulations

Creating and implementing communication policies that align with HIPAA regulations ensures compliance, protects patient privacy, and maintains the...

Read More