Image of individual in handcuffs for blog about Understanding criminal penalties for HIPAA violations

2 min read

Understanding criminal penalties for HIPAA violations

While the civil penalties for HIPAA violations often get the spotlight, the law also enforces serious criminal penalties for individuals or entities that intentionally misuse or mishandle protected health information (PHI). Criminal penalties, which...

Read More
Image of group therapy session for blog about Confidentiality for substance use disorder records

3 min read

Confidentiality for substance use disorder records

This year, the HHS Office for Civil Rights began reinforcing regulations outlined in 42 CFR Part 2, which strengthens the protection of substance use...

Read More
digital screen with text chatgpt

3 min read

The use of ChatGPT in healthcare

When considering which model would be better suited for healthcare, ChatGPT-4 has improved accuracy. Its capacity to handle intricate queries makes...

Read More
radiology screen/images

1 min read

Radiology provider faces lawsuit following data breach

A class action lawsuit claims Akumin failed to protect patient info before a cyberattack.

Read More
digtial brain blue

3 min read

How deep learning is redefining healthcare cybersecurity

Integrating artificial intelligence (AI) and machine learning (ML) into cybersecurity solutions has transformed patient care through electronic...

Read More
provider hand over body image

2 min read

The pros and cons of using AI in healthcare

Healthcare providers must know when to integrate AI into their workflows to optimize patient care and improve efficiency. Moreover, understanding its...

Read More
doctor and lawyer with medical and legal symbols

2 min read

Are healthcare lawyers considered business associates under HIPAA?

Determining whether a healthcare lawyer is a business associate under HIPAA is context-dependent. The key consideration is whether their services...

Read More
Image of lock for blog about What is static application security testing?

2 min read

What is static application security testing?

Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining...

Read More
Image of emails for blog about What is vulnerability testing?

2 min read

What is vulnerability testing?

Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...

Read More
Image of someone at a computer for blog about What is fake hacking, and why should you care?

2 min read

What is fake hacking and why should you care?

Fake hacking is when someone pretends to hack your computer or system to scare you. It’s not the same as real hacking, where someone breaks into your...

Read More
Image of someone looking at emails for blog about Auditing email campaigns

2 min read

Auditing email campaigns

Auditing email campaigns involves a review of email marketing strategies, content, performance metrics, and compliance with best practices and...

Read More
Image of shield for blog about Understanding cybersecurity performance goals 

2 min read

Understanding cybersecurity performance goals 

Released in January 2024, the HHS Cybersecurity Performance Goals (CPGs) are designed to help healthcare organizations prioritize necessary security...

Read More
Image of patient and provider talking for blog about Can authorization be verbal?

2 min read

Can authorization be verbal?

Verbal authorization can be valid in healthcare under specific circumstances, but it depends on the context, the type of information being disclosed,...

Read More