What is the Emergency Medical Treatment and Labor Act (EMTALA)?

3 min read

What is the Emergency Medical Treatment and Labor Act (EMTALA)?

The healthcare industry in the United States has transformed over the years, focusing on ensuring equitable access to emergency medical care regardless of an individual's insurance status or ability to pay. At the forefront of this effort stands the...

Read More
Texas Attorney General sues Biden Administration over HIPAA Privacy Rule

4 min read

Texas Attorney General sues Biden Administration over HIPAA Privacy Rule

Texas Attorney General Ken Paxton is suing the Biden administration, claiming HIPAA Privacy Rule regulations hinder state law enforcement...

Read More
Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

1 min read

Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

Planned Parenthood has become the latest target in a recent ransomware attack in its Montana branch.

Read More
What do you need to meet HIPAA standards?

3 min read

What do you need to meet HIPAA standards?

To meet HIPAA standards when dealing with protected health information (PHI), you need a comprehensive framework that covers multiple aspects of your...

Read More
Cyber fire drills for healthcare cybersecurity

3 min read

Cyber fire drills for healthcare cybersecurity

Despite cybersecurity policies and employee training programs, healthcare organizations frequently fall victim to cyberattacks. Organizations must...

Read More
What is intent based networking?

1 min read

What is intent based networking?

Intent-based networking is a form of network management that uses machine learning and automation.

Read More
What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher...

Read More
HHS-OIG: Improving cloud security controls 

3 min read

HHS-OIG: Improving cloud security controls

Cloud computing is now a fundamental aspect of modern business operations, making the security and protection of cloud-based systems more necessary...

Read More
Lawsuit filed after the Kootenai Health data breach

2 min read

Lawsuit filed after the Kootenai Health data breach

Kootenai Health is facing a federal class-action lawsuit for allegedly failing to protect sensitive patient information. After the breach, some...

Read More
What is cybersquatting?

2 min read

What is cybersquatting?

Cybersquatters buy or register domain names that are identical or confusingly similar to trademarks, business names, or personal names. They usually...

Read More
Healthcare Cybersecurity Act introduced to the House of Representatives

1 min read

Healthcare Cybersecurity Act introduced to House of Representatives

The new act, a companion to an act introduced to the Senate, hopes to improve healthcare cybersecurity by increasing government partnerships and more.

Read More
Why encrypted email is a must in remote work settings

2 min read

Why encrypted email is a must in remote work settings

With so many healthcare professionals working from home, protecting patient information has become even more challenging. Since email is the most...

Read More
Supply chain security Case studies and best practices

5 min read

Supply chain security: Case studies and best practices

The healthcare industry is an ideal target for cyberattackers, even more so than most other industries. There are several reasons for this, but the...

Read More