Image of lock for blog about What is static application security testing?

2 min read

What is static application security testing?

Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining its source code, bytecode, or binary code without executing the program. The strategy allows...

Read More
Image of emails for blog about What is vulnerability testing?

2 min read

What is vulnerability testing?

Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...

Read More
Image of someone at a computer for blog about What is fake hacking, and why should you care?

2 min read

What is fake hacking and why should you care?

Fake hacking is when someone pretends to hack your computer or system to scare you. It’s not the same as real hacking, where someone breaks into your...

Read More
Image of someone looking at emails for blog about Auditing email campaigns

2 min read

Auditing email campaigns

Auditing email campaigns involves a review of email marketing strategies, content, performance metrics, and compliance with best practices and...

Read More
Image of shield for blog about Understanding cybersecurity performance goals 

2 min read

Understanding cybersecurity performance goals 

Released in January 2024, the HHS Cybersecurity Performance Goals (CPGs) are designed to help healthcare organizations prioritize necessary security...

Read More
Image of patient and provider talking for blog about Can authorization be verbal?

2 min read

Can authorization be verbal?

Verbal authorization can be valid in healthcare under specific circumstances, but it depends on the context, the type of information being disclosed,...

Read More
Image of candle for blog about Does HIPAA end when life does?

3 min read

Does HIPAA end when life does?

Many assume privacy concerns end with death, but HIPAA protections continue to apply. The confidentiality of medical records remains important for...

Read More
Image of shield for blog about What is NIST compliance

3 min read

What is NIST compliance

The National Institute of Standards and Technology (NIST) helps organizations strengthen their cybersecurity practices. Federal agencies,...

Read More
digital clock

2 min read

New HIPAA Rule mandates 72-hour data restoration

On December 27, 2024, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a Notice of Proposed Rulemaking...

Read More
2025 digital image

5 min read

Avoiding HIPAA violations in 2025: Lessons learned from past breaches

The Health Insurance Portability and Accountability Act (HIPAA) is a US law designed to protect patient privacy and secure medical information. It...

Read More
american addiction centers logo

2 min read

American Addiction Centers faces data breach impacting over 410,000

Brentwood, TN-based rehabilitation center American Addiction Centers, Inc., recently disclosed a data breach affecting 410,747 patients, exposing...

Read More
digital security lock

3 min read

Report: Ransomware attacks cause $1.9 million daily loss

The healthcare sector remains a major target in a year of incessant cyberattacks against the United States. Ransomware attacks on healthcare...

Read More
Image of shield for blog about HHS proposes historic HIPAA Security Rule update to combat rising cyber threats

1 min read

HHS proposes HIPAA Security Rule update to combat rising cyber threats

The HHS Office for Civil Rights proposed updates to the HIPAA Security Rule, marking the first major revision since 2013, to address the growing...

Read More