Cybersecurity (18)

Incident reports in the compliance reporting process

4 min read

Incident reports in the compliance reporting process

Healthcare settings are inherently prone to accidents and incidents that can impact patients and organizations. Maintaining an incident reporting...

Read More
When are shadow records a risk to healthcare cybersecurity?

1 min read

When are shadow records a risk to healthcare cybersecurity?

Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...

Read More
Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
2024 OCR cybersecurity newsletter

3 min read

2024 OCR cybersecurity newsletter

As cyberattacks and data breaches increase, improving physical security in healthcare facilities is necessary. HIPAA-covered entities and business...

Read More
Understanding DNS configurations for email security

4 min read

Understanding DNS configurations for email security

Email is a common communication tool, but it also attracts malicious actors. To strengthen your email security, focus on Domain Name System (DNS)...

Read More
What is rate limiting?

1 min read

What is rate limiting?

Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
CISA unveils new reporting portal for threat response 

2 min read

CISA unveils new reporting portal for threat response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are...

Read More
CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

2 min read

CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

A faulty software update from cybersecurity firm CrowdStrike is under scrutiny as the company prepares to testify before Congress. Lawmakers try to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More
PHI sharing in multi-agency services collaboration

2 min read

PHI sharing in multi-agency services collaboration

Multi-agency services in healthcare bring together different health and social service experts to provide comprehensive care to patients. By working...

Read More
What is a database?

4 min read

What is a database?

A database is an organized collection of structured information or data stored electronically in a computer system. It is usually controlled by a...

Read More
Including limited data sets in an account of disclosures

1 min read

Including limited data sets in an account of disclosures

Limited data sets are exempt from a patient's right to an accounting of disclosures.

Read More