2 min read
New cybersecurity guidance targets espionage threats
The CISA, NSA, and FBI along with international partners, released guidance in response to recent cyber espionage by PRC-affiliated threat actors.
Read More2 min read
The CISA, NSA, and FBI along with international partners, released guidance in response to recent cyber espionage by PRC-affiliated threat actors.
Read More3 min read
The recent recall of Yaz Plus, a hormonal contraceptive pill, in South Africa, threw the spotlight on the safety of birth control pills, with several...
1 min read
The FDA has introduced recommendations for managing the continuous updates of AI-enabled medical devices. The approach includes a plan outlining how...
2 min read
The US Food and Drug Administration (FDA) recently called on blood suppliers to increase their cybersecurity to safeguard the safety and integrity of...
2 min read
According to an article on the communication gaps between primary care and specialist physicians, less than a quarter (22%) of primary care...
3 min read
HIPAA compliance involves adhering to the standards set forth by the Health Insurance Portability and Accountability Act (HIPAA) to ensure the...
3 min read
Internal and external HIPAA audits are not interchangeable; they are complementary tools in a comprehensive compliance strategy. Internal audits are...
2 min read
Russian authorities arrest a high-profile ransomware suspect wanted by the FBI, spotlighting international tensions over cybercrime enforcement.
2 min read
According to the HHS Security Series on Risk Analysis and Management, “The required implementation specification at § 164.308(a)(1)(ii)(A), for Risk...
3 min read
Risk analysis includes identifying where ePHI is created, received, maintained, or transmitted. Organizations can discover potential risks to their...
1 min read
Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...
2 min read
Internal HIPAA audits are a vital step toward ensuring the security and privacy of PHI. They help organizations remain compliant and build a culture...
2 min read
Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...