Image of someone on a computer for blog about U.S. Army soldier arrested for alleged role in hacking incident

3 min read

U.S. Army soldier arrested for alleged role in hacking incident

A U.S. Army communications specialist was arrested in Texas for allegedly leaking presidential call logs and hacking telecommunications firms as part of a broader cybercriminal operation linked to the Snowflake hacking campaign.

Read More
Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More
Image of laptop for blog about What are technology-neutral standards? 

3 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of two people shaking hands for blog about Mergers and HIPAA

2 min read

Mergers and HIPAA

Mergers in the healthcare industry can significantly impact compliance with the Health Insurance Portability and Accountability Act (HIPAA). While...

Read More
law gavel and scale

2 min read

Elgon Information Systems to pay $80,000 for ransomware breach

The HHS Office for Civil Rights (OCR) issued its first HIPAA enforcement action of 2025, settling on a $80,000 penalty on Elgon Information Systems...

Read More
red computer data lines

2 min read

The role of Google's Red Team in securing AI development

Google's Red Team represents a major component in the company's approach to AI security, working to identify and address potential vulnerabilities...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
red data background with lock

1 min read

22K consumers affected by In-Home Attendant Services breach

Texas-based healthcare provider In-Home Attendant Services, Ltd. recently reported that a data breach affected 22,000 consumers, exposing their...

Read More
smartphone sitting on world map

3 min read

Exploring how HIPAA affects new communication technologies

New communication tools are changing healthcare but bring risks if patient privacy isn’t protected. Providers must ensure these technologies align...

Read More
Image of gavel for blog about The difference between civil and criminal HIPAA penalties

2 min read

The difference between civil and criminal HIPAA penalties

While both civil and criminal penalties aim to uphold the integrity of HIPAA, the primary difference lies in intent and enforcement. Civil penalties...

Read More
Image of lock for blog about A guide to responding and reporting data breaches

3 min read

A guide to responding and reporting data breaches

Responding to and reporting a data breach is a responsibility that requires prompt action, transparency, and adherence to regulatory requirements. By...

Read More
Image of federal office building for blog about Chinese hackers target U.S. Treasury Department

2 min read

Chinese hackers target U.S. Treasury Department

State-sponsored Chinese hackers breach U.S. Treasury systems, exposing vulnerabilities in government cybersecurity.

Read More
Image of birth control pills for blog about How does the updated HIPAA Privacy Rule support reproductive healthcare privacy?

3 min read

How the updated HIPAA Privacy Rule supports reproductive healthcare privacy

In its 2024 Year in Review, the U.S. Department of Health and Human Services' Office for Civil Rights (HHS OCR) stressed its commitment to enhancing...

Read More