clipboard with magnifying glass and security symbols

2 min read

What are the HIPAA requirements after a breach?

Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches reported by covered entities.

Read More
digital computer icons in blue

2 min read

SIEMs and their role in breach detection

More than one-third of responding health institutions reported at least one ransomware attack in the preceding year, according to a 2021 report by...

Read More
familylinks logo

2 min read

Familylinks concludes 3-month review of data breach

Familylinks concluded a three-month comprehensive review of all data affected after suspicious activity was detected within one of its employee's...

Read More
computer server red background

1 min read

Rhode Island computer network hit by cyberattack

The attack resulted in the state shutting down its online benefits systems.

Read More
Image of stars for blog about Social media HIPAA violation series: Online reviews

2 min read

Social media HIPAA violation series: Online reviews

A New Jersey psychiatric practice faced a $30,000 settlement after disclosing patient information in responses to online reviews.

Read More
Image of glucose monitor for blog about What is patient-generated health data?

2 min read

What is patient-generated health data?

Patient-generated health data (PGHD) allows patients to participate in their health management by reporting data related to their well-being or...

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More
Image of figures representing data, like charts and graphs for blog about What are regional extension centers? 

2 min read

What are regional extension centers?

Regional extension centers (RECs) are organizations established under the HITECH Act to provide technical assistance and support to healthcare...

Read More
Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
Image of shield for blog about The HITECH Act and funding workforce development

2 min read

The HITECH Act and funding workforce development

The HITECH Act was a piece of legislation that addressed shortages of skilled professionals needed for electronic health records (EHRs) and other...

Read More
man on stretcher in emergency room

3 min read

Patient authorization exceptions

Under HIPAA, patient authorization exceptions allow protected health information (PHI) disclosure without consent for treatment, payment, and...

Read More
globe with medical symbols

5 min read

International outsourcing and HIPAA compliance

As the healthcare sector becomes more globalized, local hospitals must understand the HIPAA implications of outsourcing to non-US-based...

Read More
heart on computer screen

2 min read

Two dating websites face database breach

Cybercriminals have targeted two dating websites, resulting in over 850,000 users having their data accessed.

Read More