Image of someone on a computer for blog about Single email breach exposes sensitive data of 11,000 minors

1 min read

Single email breach exposes sensitive data of 11,000 minors

A phishing attack on Datavant exposed the sensitive data of over 11,000 minors, revealing the impact of a single compromised email account.

Read More
data breach text on paper

2 min read

How to know if your organization has experienced a breach

As seen in the case of the data breach experienced by Familylinks, the organization noticed suspicious activity in one of their employee email...

Read More
clipboard with magnifying glass and security symbols

2 min read

What are the HIPAA requirements after a breach?

Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches...

Read More
digital computer icons in blue

2 min read

SIEMs and their role in breach detection

More than one-third of responding health institutions reported at least one ransomware attack in the preceding year, according to a 2021 report by...

Read More
familylinks logo

2 min read

Familylinks concludes 3-month review of data breach

Familylinks concluded a three-month comprehensive review of all data affected after suspicious activity was detected within one of its employee's...

Read More
computer server red background

1 min read

Rhode Island computer network hit by cyberattack

The attack resulted in the state shutting down its online benefits systems.

Read More
Image of stars for blog about Social media HIPAA violation series: Online reviews

2 min read

Social media HIPAA violation series: Online reviews

A New Jersey psychiatric practice faced a $30,000 settlement after disclosing patient information in responses to online reviews.

Read More
Image of glucose monitor for blog about What is patient-generated health data?

2 min read

What is patient-generated health data?

Patient-generated health data (PGHD) allows patients to participate in their health management by reporting data related to their well-being or...

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More
Image of figures representing data, like charts and graphs for blog about What are regional extension centers? 

2 min read

What are regional extension centers?

Regional extension centers (RECs) are organizations established under the HITECH Act to provide technical assistance and support to healthcare...

Read More
Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
Image of shield for blog about The HITECH Act and funding workforce development

2 min read

The HITECH Act and funding workforce development

The HITECH Act was a piece of legislation that addressed shortages of skilled professionals needed for electronic health records (EHRs) and other...

Read More
man on stretcher in emergency room

3 min read

Patient authorization exceptions

Under HIPAA, patient authorization exceptions allow protected health information (PHI) disclosure without consent for treatment, payment, and...

Read More