Image of locks for blog about FAQs- Encryption and HIPAA compliance

2 min read

FAQs: Encryption and HIPAA compliance

Encryption converts electronic data into an unreadable format, ensuring its confidentiality and integrity. While not explicitly mandated, HIPAA strongly recommends encryption as a best practice. Using encryption shows a commitment to patient privacy...

Read More
Image of stethoscope and heart for blog about Title I of the Health Insurance Portability and Accountability Act (HIPAA)

2 min read

Title I of HIPAA

Title I of the Health Insurance Portability and Accountability Act (HIPAA) is focused on Health Care Access, Portability, and Renewability. It...

Read More
Image of blocks representing insurance for blog about What is Title IV under HIPAA?

2 min read

What is Title IV under HIPAA?

Title IV of HIPAA is the Enforcement and Revenue Offsets section, which focuses on ensuring compliance with the act’s provisions regarding health...

Read More
Image of someone typing for blog about What is endpoint protection?

2 min read

What is endpoint protection?

Endpoint protection, also known as endpoint security, is the securing endpoints or entry points of end-user devices such as desktops, laptops,...

Read More
Image of tax calculator for blog about Title III of HIPAA

1 min read

Title III of HIPAA

Title III of HIPAA is the Tax-Related Health provision, which establishes tax-preferred treatment for medical savings accounts (MSAs) and provides...

Read More
woman holding smartphone

2 min read

Sharing anonymized patient stories while maintaining HIPAA compliance

Healthcare organizations can share anonymized patient stories to build trust, educate patients, and reduce stigma, all while complying with HIPAA....

Read More
digital icons in front of medical equipment

2 min read

The 10 biggest health data breaches of 2024

In 2024, approximately 168 million individuals were affected by breaches impacting 500 or more. The tenbiggest were responsible for nearly 137...

Read More
informed consent form on clipboard with stethoscope

2 min read

Informed consent and protecting patient autonomy

Informed consent is more than a procedural formality; it protects patient autonomy on a deeper, almost philosophical level. Informed consent has...

Read More
stack of paper with stethoscope

1 min read

Brockton Health Center breach exposes 6 years of medical records

Brockton Neighborhood Health Center (BNHC) recently disclosed a data breach after detecting unusual activity on its computer network. The breach...

Read More
security lock on hospital graphic

2 min read

PIH Health ransomware breach exposes 17M records

Hackers claim to have exfiltrated 17 million patient records in a ransomware attack on PIH Health.

Read More
FBI seal

1 min read

FBI warns of HiatusRAT malware threat

The FBI Cyber Division released a private industry notification on December 16, 2024, warning organizations discussing HiatusRAT1 scanning campaigns.

Read More
Delaware state capitol

1 min read

HHS OCR and Delaware settle disability rights case

The HHS announced a resolution with the Delaware Department of Health and Social Services following a failure to meet their responsibilities towards...

Read More
green digital security lock

2 min read

Rocky Mountain Gastroenterology notifies patients of data breach

The Colorado-based Gastroenterology center recently notified over 300,000 patients of a data breach.

Read More