Adopted standards and operating rules from the CMS

3 min read

Adopted standards and operating rules from the CMS

According to the Centers for Medicare and Medicaid Services, “HIPAA required HHS to establish national standards for electronic transactions to improve the efficiency and effectiveness of the nation's health care system.”

Read More
Data security vs. cyber security

2 min read

Data security vs. cyber security

Data security focuses on protecting data from unauthorized access, corruption, or theft through measures such as encryption, access controls, and...

Read More
Confidant Health's unsecured database unveiled by security researcher

1 min read

Confidant Health's unsecured database unveiled by security researcher

On September 6, 2024, Confidant Health’s unsecured database was discovered by a security researcher exposinghighly sensitive information that...

Read More
Updating your HIPAA documentation

2 min read

Updating your HIPAA documentation

As HIPAA rules are periodically updated to address new challenges and technologies, maintaining current documentation helps avoid costly penalties...

Read More
HIPAA and email deletion rules

3 min read

HIPAA and email deletion rules

HIPAA requires that emails containing protected health information (PHI) be securely managed, retained, and deleted to prevent unauthorized access...

Read More
What is the Emergency Medical Treatment and Labor Act (EMTALA)?

3 min read

What is the Emergency Medical Treatment and Labor Act (EMTALA)?

The healthcare industry in the United States has transformed over the years, focusing on ensuring equitable access to emergency medical care...

Read More
Texas Attorney General sues Biden Administration over HIPAA Privacy Rule

4 min read

Texas Attorney General sues Biden Administration over HIPAA Privacy Rule

Texas Attorney General Ken Paxton is suing the Biden administration, claiming HIPAA Privacy Rule regulations hinder state law enforcement...

Read More
Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

1 min read

Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

Planned Parenthood has become the latest target in a recent ransomware attack in its Montana branch.

Read More
What do you need to meet HIPAA standards?

3 min read

What do you need to meet HIPAA standards?

To meet HIPAA standards when dealing with protected health information (PHI), you need a comprehensive framework that covers multiple aspects of your...

Read More
Cyber fire drills for healthcare cybersecurity

3 min read

Cyber fire drills for healthcare cybersecurity

Despite cybersecurity policies and employee training programs, healthcare organizations frequently fall victim to cyberattacks. Organizations must...

Read More
What is intent based networking?

1 min read

What is intent based networking?

Intent-based networking is a form of network management that uses machine learning and automation.

Read More
What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher...

Read More
HHS-OIG: Improving cloud security controls 

3 min read

HHS-OIG: Improving cloud security controls

Cloud computing is now a fundamental aspect of modern business operations, making the security and protection of cloud-based systems more necessary...

Read More