Image of locks for blog about Managing technological and physical risk

1 min read

Managing technological and physical risks

Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical disruptions to operations, like a power outage. According to a study in BMC Medical Informatics and...

Read More
Image of two people looking at data for blog about Internal HIPAA audits

2 min read

Internal HIPAA audits

Internal HIPAA audits are a vital step toward ensuring the security and privacy of PHI. They help organizations remain compliant and build a culture...

Read More
Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...

Read More
open lock with computer code

1 min read

More than 10,000 affected in Connecticut GI breach

On December 2, 2024, Connecticut GI and Gastroenterology Associates of Fairfield reported a data breach involving the theft of 10,568 patients’...

Read More
childrens hospital colorado logo

1 min read

Children’s Hospital Colorado fined $548K for HIPAA violations

Children’s Hospital Colorado faces a hefty penalty from the HHS OCR following multiple HIPAA violations impacting thousands of individuals.

Read More
blue digital check boxes

3 min read

Do you need a dedicated HIPAA compliance officer?

While organizations have flexibility in structuring their compliance functions, having dedicated HIPAA compliance staff can help ensure ongoing...

Read More
legal scale with cash

2 min read

$8.9M settlement reached in Elekta and NMH data breach affect

Elekta Inc. and Northwestern Memorial Healthcare recently agreed to an $8.9 million settlement after a 2021 ransomware attack compromised the...

Read More
digital locks on red blocks

3 min read

Types of data breaches

What is a data breach? Data breaches occur when sensitive, confidential, or protected information is accessed or disclosed without proper...

Read More
Image of blocks for blog about Scalability and patient engagement

2 min read

Scalability and patient engagement

Enhancing scalability in patient engagement facilitates efficient, consistent, and personalized care. Making sure your organization is scaling up as...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
atrium health logo

2 min read

Atrium Health notifies HHS of data breach impacting over 585,000

Atrium Health has disclosed a data breach affecting over 585,000 individuals, linked to third-party tracking technologies on its patient portal.

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

3 min read

The uses of control analyses in email

A Journal of the American Medical Informatics Association qualitative analysis looking at email communication between patients and providers noted...

Read More
Image of thumbs up and down for blog about Social media HIPAA violation series: Twitter disclosure

2 min read

Social media HIPAA violation series: Twitter disclosure

A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...

Read More