cord into back of computer red

3 min read

Lateral movement explained: How hackers navigate networks undetected

Lateral movement is a tactic in cyberattacks that allows hackers to navigate through a network undetected after gaining initial access. This stealthy maneuvering enables attackers to locate valuable assets and data, maintain persistent control, and...

Read More
medical symbol and hand

3 min read

How HIPAA protects collaborative healthcare

Healthcare organizations need to use collaborative healthcare efforts because they help ensure patients receive the best possible care. This need...

Read More
CISA logo

2 min read

The CISA Preransomware Notifications Initiative

The Preransomware Notifications Initiative is a program by the Cybersecurity and Infrastructure Security Agency (CISA) that provides early warnings...

Read More
law gavel with stethoscope

2 min read

Do covered entities need to inform patients about info shared in litigation?

Patients can request an accounting of disclosures that includes information shared by their covered entity during litigation, as per 45 CFR 164.528.

Read More
Image of warehouse for blog about Compliance in healthcare supply chain management 

3 min read

Compliance in healthcare supply chain management

In healthcare, where so much is at stake, the supply chain is fundamental for getting medications, equipment, and resources where they’re needed...

Read More
Image of person at a computer for blog about Data breach at Center for Vein Restoration puts 500,000 Americans at risk

2 min read

Data breach at Center for Vein Restoration impacts 500k

A data breach at the Center for Vein Restoration (CVR) has exposed the personal and medical information of 445,000 individuals.

Read More
Image of gavel and money for blog about HIPAA violation fines 

3 min read

HIPAA violation fines 

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) is a concern for healthcare organizations and business associates...

Read More
Image of email icons for blog about Does the security rule allow for sending ePHI via email or the Internet? 

2 min read

Does the security rule allow for sending ePHI via email or Internet? 

The HIPAA security rule permits sending electronic protected health information (ePHI) via email or the Internet, provided safeguards are in place to...

Read More
Image of piggy bank for blog about What is a Medical Savings Account (MSA)?

2 min read

What is a Medical Savings Account (MSA)?

A Medical Savings Account (MSA) is a type of financial account designed to help individuals save money for healthcare expenses.

Read More
digital representation of quantum computing

3 min read

The fundamentals of quantum computing

The story of quantum computing is one of human ingenuity and curiosity, from the early 20th-century discovery of quantum mechanics to a future of...

Read More
phone with stethoscope

3 min read

What information can hospitals give over the phone?

As healthcare providers, patients, and families understand the complexities of hospital communication, a common question arises: what information can...

Read More
child at doctors office

5 min read

Ensuring HIPAA compliance in small to medium-sized practices

Small to medium-sized practices may face challenges with HIPAA requirements due to limited resources and staffing constraints. They should prioritize...

Read More
digital IP address icons

4 min read

What is DNS cache poisoning?

The domain name system (DNS) translates human-readable domain names into machine-readable IP addresses. However, this system is not immune to...

Read More