Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk mitigation strategies in healthcare to assess the most beneficial approach to tackling threats to their...

Read More
atrium health logo

2 min read

Atrium Health notifies HHS of data breach impacting over 585,000

Atrium Health has disclosed a data breach affecting over 585,000 individuals, linked to third-party tracking technologies on its patient portal.

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

2 min read

The uses of control analyses in email

Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...

Read More
Image of someone analyzing data for blog about Do forensic firms need to be HIPAA compliant? 

2 min read

Do forensic firms need to be HIPAA compliant? 

Forensic firms are mostly responsible for analyzing the systems of organizations extensively, usually following a data breach. Through their work,...

Read More
Image of thumbs up and down for blog about Social media HIPAA violation series: Twitter disclosure

2 min read

Social media HIPAA violation series: Twitter disclosure

A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...

Read More
Image of hands for blog about What is the role of social awareness in mental health communications?

2 min read

What is the role of social awareness in mental health communications?

Social awareness is the ability to recognize and understand the emotions, thoughts, and perspectives of others. The concept is often reflected in how...

Read More
cellphone tower with red

2 min read

Chinese cyber-espionage group hacks at least 8 major US telecom networks

What happened Salt Typhoon, a Chinese cyber-espionage group, allegedly infiltrated at least eight US telecommunications firms, stealing large volumes...

Read More
stethoscope with computer data

2 min read

Why healthcare organizations are common targets for data breaches

The motive behind a data breach is often reflected in the financial, ideological, and strategic interests of threat actors.It is especially financial...

Read More
laptop with lung xray, tablet with body scan and stethoscope on surface

2 min read

Aligning clinical trial innovation with HIPAA standards

Clinical trial enrollment is often more driven by sociodemographic factors rather than clinical factors, making it difficult to obtain a diverse pool...

Read More
Image of congress room for blog about What providers must know about the new cybersecurity Senate Bill

2 min read

What providers should know about the new cybersecurity Senate Bill

The U.S. Senate has introduced the Health Care Cybersecurity and Resiliency Act of 2024, a bipartisan effort aimed at enhancing cybersecurity in the...

Read More
Image of two people holding hands for blog about HIPAA email for end-of-life care

3 min read

HIPAA email for end-of-life care

End-of-life care conversations are important yet sensitive, allowing patients and their families to make informed decisions during difficult times....

Read More
Image of lock for blog about Massive data breach exposes 34,000 patients' PHI

1 min read

Massive data breach exposes 34,000 patients' PHI

The HHS announced a $1.19 million penalty against Gulf Coast Pain Consultants, LLC for multiple violations of the HIPAA Security Rule.

Read More
Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These...

Read More