blue shield

2 min read

What is the difference between IOCs and IOAs?

Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or...

Read More
keyboard with floating people icons

2 min read

Notification requirements if less than 500 individuals are affected

The Breach Notification Rule requires that covered entities follow an outlined process when protected health information (PHI) is inappropriately...

Read More
artivion logo

1 min read

Supply chains and patients at risk in Artivion breach

Medical device company Artivion disclosed on December 9, 2024, that a ransomware attack disrupted its systems, affecting order and shipping...

Read More
Image of someone with a clipboard for blog about Conducting a third-party audit

3 min read

Conducting a third-party audit

Conducting a third-party audit involves evaluating an organization’s processes, systems, or practices to assess compliance with national standards,...

Read More
Image of lock for blog about Federal government pledges improved cyberattack partnerships

3 min read

Federal government pledges improved cyberattack partnerships

The federal government has unveiled a proposed update to the National Cyber Incident Response Plan. The revision aims to enhance public-private...

Read More
romanian flag with tear

2 min read

Romania's election systems targeted in over 85,000 cyberattacks

Romania faces election turmoil after over 85,000 cyberattacks and a TikTok disinformation campaign linked to Russia disrupted presidential voting.

Read More
Image of lcok for blog about The importance of secure healthcare information management

3 min read

The importance of secure healthcare information management

With over 328 million terabytes of data generated daily, cyber threats are rising as criminals seek to exploit this valuable resource. Today, secure...

Read More
stack of paperwork

2 min read

Notification requirements if more than 500 individuals are affected

The Breach Notification Rule establishes protocols for handling and responding to significant data breaches involving protected health information...

Read More
HIPAA cloud with digital lock

2 min read

What are the notification requirements after a breach?

Breach notifications are important because they alert individuals whose personal data may have been compromised, helping them take necessary...

Read More
Image of thumbs pointing up or down for blog about Social media HIPAA violation series: Infant photo

2 min read

Social media HIPAA violation series: Infant photo

A photo of a baby shared online by a MUSC Health employee without parental consent illustrated ongoing issues with HIPAA compliance and social media...

Read More
Image of files going from one location to another for blog about How data portability combats vendor lock-ins

1 min read

How data portability combats vendor lock-ins

Data portability is the idea that organizations can transfer their data seamlessly between different platforms or applications. The concept is put in...

Read More
Image of someone on a computer for blog about Single email breach exposes sensitive data of 11,000 minors

1 min read

Single email breach exposes sensitive data of 11,000 minors

A phishing attack on Datavant exposed the sensitive data of over 11,000 minors, revealing the impact of a single compromised email account.

Read More
data breach text on paper

2 min read

How to know if your organization has experienced a breach

As seen in the case of the data breach experienced by Familylinks, the organization noticed suspicious activity in one of their employee email...

Read More