digital lock with medical symbol for post How HIPAA defines confidentiality, integrity, and availability of ePHI

3 min read

How HIPAA defines confidentiality, integrity, and availability of ePHI

HIPAA defines confidentiality as the protection of patient data from unauthorized disclosure. Integrity involves safeguarding data accuracy and authenticity. Availability is the assurance that electronic Protected Health Information (ePHI) remains...

Read More
people cutouts for post Do community health workers have to comply with HIPAA

1 min read

Do community health workers have to comply with HIPAA?

Community health workers access protected health information (PHI), so the workers and the centers they operate in have to comply with HIPAA.

Read More
wayback machine logo for post Internet Archives face multiple breaches impacting millions

1 min read

Internet Archives face multiple breaches impacting millions

The Internet Archive appears to be the victim of multiple, targeted attacks that have impacted at least 31 million individuals.

Read More
Image of phone for blog about Are voicemail transcriptions subject to HIPAA?

2 min read

Are voicemail transcriptions subject to HIPAA?

Voicemail transcriptions are subject to HIPAA regulations if they contain protected health information (PHI), which includes any identifiable patient...

Read More
Image of couple holding hands for blog about Does HIPAA apply to spouses? 

3 min read

Does HIPAA apply to spouses? 

According to the HHS, there are certain situations when providers may share health information with spouses. Providers must understand HIPAA and use...

Read More
Image of the statute of liberty for article about New York takes bold steps to strengthen hospital cybersecurity

1 min read

New York takes bold steps to strengthen hospital cybersecurity

The state recently implemented cybersecurity regulations targeted at general hospital's breach reporting requirements.

Read More
Image of locks for blog about Privacy vs confidentiality in healthcare

2 min read

Privacy vs confidentiality in healthcare

Privacy is about a patient's control over their information while confidentiality is the healthcare provider's duty to safeguard that information...

Read More
USPS trucks for post Is the US Postal Service a business associate under HIPAA?

2 min read

Is the US Postal Service a business associate under HIPAA?

The US Postal Service is not a business associate under HIPAA because it does not access or use protected health information. Instead, it serves as a...

Read More
digital brain with AI text for post Microsoft experts address AI bias at HLTH 2024 conference

2 min read

Microsoft experts address AI bias at HLTH 2024 conference

The recent HLTH 2024 conference, held October 20-23 in Las Vegas, gathered leaders and innovators to explore the future of healthcare technology,...

Read More
woman on phone with floating email icons for post Improve patient privacy in underfunded clinics with secure email

2 min read

Improve patient privacy in underfunded clinics with secure email

In many under-resourced healthcare facilities across the world, patient privacy can become compromised, especially when a high volume of patients is...

Read More
google play logo for post Over 200 malicious apps on Google Play downloaded millions of times

2 min read

Over 200 malicious apps on Google Play downloaded millions of times

Recent reports have uncovered a surge of malicious apps on Google Play, the official Android app store. More than 200 harmful apps have been...

Read More
Image of email icon and security icon for blog about Identifying an email phishing attack

4 min read

Identifying an email phishing attack

Phishing attacks have become one of the most common cyber threats today, with hackers continuously refining their techniques to exploit unsuspecting...

Read More
An image of a warning sign for blog about Farah What is fileless malware

4 min read

What is fileless malware

Fileless malware is malicious code that uses a company’s memory instead of the hard drive. It uses legitimate programs to compromise a computer...

Read More