computer server red background

1 min read

Rhode Island computer network hit by cyberattack

The attack resulted in the state shutting down its online benefits systems.

Read More
Image of stars for blog about Social media HIPAA violation series: Online reviews

2 min read

Social media HIPAA violation series: Online reviews

A New Jersey psychiatric practice faced a $30,000 settlement after disclosing patient information in responses to online reviews.

Read More
Image of glucose monitor for blog about What is patient-generated health data?

2 min read

What is patient-generated health data?

Patient-generated health data (PGHD) allows patients to participate in their health management by reporting data related to their well-being or...

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More
Image of figures representing data, like charts and graphs for blog about What are regional extension centers? 

2 min read

What are regional extension centers?

Regional extension centers (RECs) are organizations established under the HITECH Act to provide technical assistance and support to healthcare...

Read More
Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
Image of shield for blog about The HITECH Act and funding workforce development

2 min read

The HITECH Act and funding workforce development

The HITECH Act was a piece of legislation that addressed shortages of skilled professionals needed for electronic health records (EHRs) and other...

Read More
man on stretcher in emergency room

3 min read

Patient authorization exceptions

Under HIPAA, patient authorization exceptions allow protected health information (PHI) disclosure without consent for treatment, payment, and...

Read More
globe with medical symbols

5 min read

International outsourcing and HIPAA compliance

As the healthcare sector becomes more globalized, local hospitals must understand the HIPAA implications of outsourcing to non-US-based...

Read More
heart on computer screen

2 min read

Two dating websites face database breach

Cybercriminals have targeted two dating websites, resulting in over 850,000 users having their data accessed.

Read More
hand texting on smartphone with floating digital icons

2 min read

US officials urge Americans to encrypt texts

With increasing cyberattacks targeting phones, encrypted text messaging may become a necessity.

Read More
screen actors guild logo

1 min read

Screen Actors Guild Health Plan faces class action lawsuit over data breach

A class action lawsuit was filed against the Screen Actors Guild-American Federation of Television and Radio Artists (SAG-AFTRA) Health Plan...

Read More
hacker at computer with digital code and russian flag

3 min read

Why Russia is often linked to ransomware cases

Russia frequently appears in discussions about cyber attacks, and for good reason. The country’s geopolitical climate, legal policies, and thriving...

Read More