Image of someone sending a message for blog about Third-party messaging apps and HIPAA compliance

3 min read

Third-party messaging apps and HIPAA compliance

Healthcare organizations love being able to message patients on apps, but these providers need to stay HIPAA compliant and maintain patient trust. Without safeguards like encryption, business associate agreements (BAAs), and access controls, these...

Read More
Image of several electornic devices, like a laptop and phone, for blog about Acceptable use policies (AUP) and HIPAA compliance

3 min read

Acceptable use policies (AUP) and HIPAA compliance

An acceptable use policy (AUP) sets clear guidelines on how healthcare employees should securely handle technology and patient data. It outlines...

Read More
Image of checklist for blog about Preparing for a cyberattack

2 min read

Preparing for a cyberattack

A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...

Read More
Image of surveillance camera for blog about HIPAA and video surveillance 

4 min read

HIPAA and video surveillance

Healthcare organizations have long used video surveillance to enhance security, monitor patient and staff activities, and reduce risks. However,...

Read More
docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More
supreme court building for post US Supreme Court torn over Facebook lawsuit

1 min read

US Supreme Court torn over Facebook lawsuit

The company has been accused of fraud and misleading shareholders about user data.

Read More
blue digital lock for post October OCR cybersecurity newsletter warns of social engineering attacks

2 min read

October OCR cybersecurity newsletter warns of social engineering attacks

The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...

Read More
wheelchair sign on building for post The intersection between HIPAA and the Americans with Disabilities Act (ADA)

3 min read

The intersection between HIPAA and the Americans with Disabilities Act (ADA)

The Health Insurance Portability and Accountability Act (HIPAA) and the Americans with Disabilities Act (ADA) often intersect in healthcare and...

Read More
lawyer with office paperwork for post What is a HIPAA power of attorney?

4 min read

What is a HIPAA power of attorney?

Understanding healthcare decisions and ensuring patient privacy can be overwhelming, especially when someone isn’t able to make decisions on their...

Read More
digital lock on computer for post What is threat hunting?

4 min read

What is threat hunting?

According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...

Read More
Image of lock for blog about Maryland cybersecurity conference rallies leaders against cybercrime

2 min read

Maryland cybersecurity conference rallies leaders against cybercrime

On November 7, 2024, the U.S. Attorney’s Office for the District of Maryland and the University of Maryland hosted a cybersecurity conference to...

Read More
Image of stethescope and phone for blog about Best practices for documenting teletherapy sessions

2 min read

Best practices for documenting teletherapy sessions

Best practices for documenting teletherapy sessions under HIPAA include recording session details without patient identifiers, focusing on clinical...

Read More
Image of shield for blog about How to avoid comming HIPAA violations in digital communications

2 min read

How to avoid common HIPAA violations in digital communications

Common HIPAA violations in digital communication include unencrypted communication, lack of access controls, inadequate staff training, sharing PHI...

Read More