Image of person at a computer for blog about Data breach at Center for Vein Restoration puts 500,000 Americans at risk

2 min read

Data breach at Center for Vein Restoration impacts 500k

A data breach at the Center for Vein Restoration (CVR) has exposed the personal and medical information of 445,000 individuals.

Read More
Image of gavel and money for blog about HIPAA violation fines 

3 min read

HIPAA violation fines 

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) is a concern for healthcare organizations and business associates...

Read More
Image of email icons for blog about Does the security rule allow for sending ePHI via email or the Internet? 

2 min read

Does the security rule allow for sending ePHI via email or Internet? 

The HIPAA security rule permits sending electronic protected health information (ePHI) via email or the Internet, provided safeguards are in place to...

Read More
Image of piggy bank for blog about What is a Medical Savings Account (MSA)?

2 min read

What is a Medical Savings Account (MSA)?

A Medical Savings Account (MSA) is a type of financial account designed to help individuals save money for healthcare expenses.

Read More
digital representation of quantum computing

3 min read

The fundamentals of quantum computing

The story of quantum computing is one of human ingenuity and curiosity, from the early 20th-century discovery of quantum mechanics to a future of...

Read More
phone with stethoscope

3 min read

What information can hospitals give over the phone?

As healthcare providers, patients, and families understand the complexities of hospital communication, a common question arises: what information can...

Read More
child at doctors office

5 min read

Ensuring HIPAA compliance in small to medium-sized practices

Small to medium-sized practices may face challenges with HIPAA requirements due to limited resources and staffing constraints. They should prioritize...

Read More
digital IP address icons

4 min read

What is DNS cache poisoning?

The domain name system (DNS) translates human-readable domain names into machine-readable IP addresses. However, this system is not immune to...

Read More
digital security shield

2 min read

Developing a HIPAA security program

A HIPAA security program is a comprehensive set of policies, procedures, and technical measures implemented by healthcare organizations to protect...

Read More
Image of different types of data, including health, for blog about What are de-identification forms?

2 min read

What are de-identification forms?

De-identification forms are documents or templates used to ensure that sensitive information, particularly personally identifiable information (PII)...

Read More
Image of police badge for blog about When does the Privacy Rule allow covered entities to disclose PHI to law enforcement? 

2 min read

When does the Privacy Rule let covered entities disclose PHI to law enforcement? 

The HIPAA Privacy Rule permits PHI disclosure to law enforcement without patient authorization in specific situations, like complying with court...

Read More
Image of computer for blog about HIPAA compliant computer disposal 

3 min read

HIPAA compliant computer disposal

The HIPAA privacy rule requires healthcare entities to create and follow policies for safely disposing of protected health information (PHI),...

Read More
Image of someone holding tickets for blog about What is a golden ticket attack?

3 min read

What is a golden ticket attack?

Golden ticket attacks are when criminals infiltrate the Kerberos authentication system. They are a serious cybersecurity threat, especially for...

Read More