Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems, data, or networks and use that access to cause harm, either intentionally or unintentionally. These...

Read More
Image of someone on a computer for blog about BayMark Health Services experiences ransomware attack

1 min read

BayMark Health Services experiences ransomware attack

BayMark Health Services, a major addiction treatment provider, has reported a ransomware attack that potentially exposed sensitive patient...

Read More
blue data screen with encryption text

2 min read

The role of automatic encryption in HIPAA compliance efforts

Automatic encryption can ensure HIPAA compliance for healthcare providers by consistently securing protected health information (PHI) without manual...

Read More
digtal smokestacks with overlaying data

3 min read

The environmental impact of using AI

As the popularity of AI technology grows, the computational power required to train and run AI models has surged. The result is an increased pressure...

Read More
digital gear blue

3 min read

The intersection of Multi-Party Computation (SMPC) and HIPAA

What is SMPC? Secure Multi-Party Computation (SMPC) is a cryptographic protocol that allows multiple parties to compute functions on private data...

Read More
floating education symbols over tablet

2 min read

PowerSchool faces large data breach

The tech vendor is known for housing student information for public schools nationwide.

Read More
floating digital healthcare icons

2 min read

How outsourcing healthcare services could lead to HIPAA violations

Organizations may choose to outsource for several reasons, including the need to reduce costs, access specialized skills, and improve scalability in...

Read More
digital documents and globe in blue

2 min read

Mechanisms to authenticate electronic protected health information

According to Section 164.312 (c )(2) of the Security Rule’s Technical Safeguards, “Mechanism to authenticate electronic protected health information...

Read More
provider pointing at clipboard with pen

2 min read

Implementation specifications group health plans must abide by

According to the Journal of Occupational and Environmental Medicine, “Under HIPAA, ‘a group health plan, and a health insurance issuer offering group...

Read More
tycon medical logo

1 min read

Tycon Medical Systems begins sending breach notices

The Virginia-based medical equipment providers is now notifying impacted customers.

Read More
digital lock with health symbol blue

2 min read

Building trust in health information exchanges

Health Information Exchanges (HIEs) have the potential to transform health care by providing secure and efficient access to patient data. These...

Read More
email icon with heart

2 min read

Secure messaging for mental health crisis intervention

Mental health professionals can ensure HIPAA compliant text messaging during a mental health crisis by selecting secure, encrypted platforms designed...

Read More
Image of school for blog about PowerSchool data breach raises alarms over student medical privacy

1 min read

PowerSchool data breach raises alarms over student medical privacy

A major education software platform in North America, PowerSchool, experienced a confirmed cyberattack impacting the data of students and teachers.

Read More