american addiction centers logo

2 min read

American Addiction Centers faces data breach impacting over 410,000

Brentwood, TN-based rehabilitation center American Addiction Centers, Inc., recently disclosed a data breach affecting 410,747 patients, exposing their protected health information (PHI).

Read More
digital security lock

3 min read

Report: Ransomware attacks cause $1.9 million daily loss

The healthcare sector remains a major target in a year of incessant cyberattacks against the United States. Ransomware attacks on healthcare...

Read More
Image of shield for blog about HHS proposes historic HIPAA Security Rule update to combat rising cyber threats

1 min read

HHS proposes HIPAA Security Rule update to combat rising cyber threats

The HHS Office for Civil Rights proposed updates to the HIPAA Security Rule, marking the first major revision since 2013, to address the growing...

Read More
krispy kreme logo

2 min read

Ransomware gang claims responsibility for Krispy Kreme cyberattack

The Play ransomware gang has claimed responsibility for a cyberattack on Krispy Kreme, disrupting online ordering and raising concerns about data...

Read More
california seal over medical background

2 min read

Unpacking California’s 2024 health law updates

In 2024, California Governor Newsom signed over 1,300 bills into law and vetoed almost 190. Among these, California enacted several impactful laws...

Read More
pieces technology logo

2 min read

Texas AG settles AI accuracy case with Pieces Technology

On September 18, 2024, Texas Attorney General Ken Paxton announced a settlement with Pieces Technology under the Texas Deceptive Trade...

Read More
lock icon on keyboard

1 min read

Student data breached in 2 Kentucky counties

Over 200 students had their records compromised in a data breach.

Read More
Image of blocks reading

3 min read

The 7 HIPAA compliance rules for covered entities

According to the U.S. Department of Health and Human Services (HHS), “Individuals, organizations, and agencies that meet the definition of a covered...

Read More
Image of individuals shaking hands for blog about Understanding BAA compliance in healthcare 

3 min read

Understanding BAA compliance in healthcare

Protecting sensitive patient information is a top priority in healthcare, especially as organizations work closely with third-party service...

Read More
Image of bullhorn for blog about Do you need authorization for face-to-face marketing?

1 min read

Do you need authorization for face-to-face marketing?

Face-to-face marketing provides a unique opportunity to connect with patients in a meaningful way. While it is generally exempt from the HIPAA...

Read More
Image for blog about What is a CI/CD pipeline? 

2 min read

What is a CI/CD pipeline?

The Continuous Integration and Continuous Delivery (or Deployment) pipeline (CI/CD) is a process that automates the processes involved in software...

Read More
Image of someone on a computer for blog about Phishing attack exposed data of over 1.1 million clients

2 min read

Phishing attack exposed data of over 1.1 million clients

A phishing attack on the Illinois Department of Human Services exposed the personal and public assistance data of over 1.1 million clients.

Read More
Image of lock for blog about Preventing unauthorized access

2 min read

Preventing unauthorized access

Preventing unauthorized access involves implementing security measures to protect systems, data, and physical assets.

Read More