Editorial (6)

Image of a shield for blog about Learning from the TriHealth Physician data breach 

2 min read

Learning from the TriHealth Physician data breach 

On November 14, 2024, TriHealth Physician Partners reported a data breach from a security incident at one of its vendors. The breach exposed...

Read More
Image of memory card in computer for blog about Quantum computing in healthcare

3 min read

Quantum computing in healthcare

Quantum computing in healthcare has the potential to revolutionize various aspects of the industry, particularly in areas such as drug discovery,...

Read More
Image of phone for blog about Social media HIPAA violation series: Citadel Winston-Salem - Tiktok missteps

2 min read

Social media HIPAA violations: Citadel Winston-Salem and Tiktok

A nurse’s TikTok videos joking about mistreating patients led to a suspension and sparked debate about professionalism and social media use in...

Read More
security icons on screen with human hand

2 min read

Human factors that affect healthcare cybersecurity

Healthcare organizations are particularly vulnerable to cyberattacks because of the volume of protected health information (PHI) they handle.

Read More
Image of someone on their phone for blog about Social media HIPAA violation series: Grady Hospital - Facebook posts

3 min read

Social media HIPAA violations: Grady Hospital and Facebook posts

A paramedic’s posts in a controversial Facebook group uncovered serious breaches of patient privacy and ethical conduct, leading to disciplinary...

Read More
medical symbol on computer

2 min read

Improving healthcare with digital competence

Investing in digital competence education for healthcare workers, complete with practical training in HIPAA compliant email solutions, can create a...

Read More
Image of individuals in therapy for blog about How to share coping strategies for patients estranged from family 

2 min read

How to share coping strategies for patients estranged from family

HIPAA compliant email offers a secure and reliable complement to therapy practices. Patients benefit from consistent support while providers are...

Read More
Image of doctor taking a blood pressure test for blog about Social media HIPAA violation series: Photo post

2 min read

Social media HIPAA violation series: Photo post

A photo shared from a Tennessee operating room in October 2020 raised concerns about privacy and professionalism, prompting Ballad Health to take...

Read More
Image of phones for blog about Social media HIPAA violations: Lincoln Hospital - Pandemic perspectives

2 min read

Social media HIPAA violations: Nurse shares pandemic perspective

A nurse’s video about working conditions during the COVID-19 pandemic sparked a HIPAA investigation, raising concerns about patient privacy and...

Read More
Image of hands for blog about Collaborative communication during SUD treatment

3 min read

Collaborative communication during SUD treatment

A collaborative Substance Use Disorder (SUD) treatment process provides patients with a higher level of care to heal and recover. To do this, SUD...

Read More
people icons connected to lightbulb

2 min read

Building patient trust through equity-centered designed digital tools

One of the biggest challenges in healthcare today involves mistrust among diverse populations. These challenges are often closely linked to a history...

Read More
Image of graph for blog about What is UBA software?

2 min read

What is UBA software?

Through continuous monitoring of user behavior, user behavior software (UBA) provides a layer of protection that complements existing security...

Read More
Image of puzzle for blog about What is business impact analysis?

2 min read

What is business impact analysis?

A business impact analysis is the first step in an effective cybersecurity policy. During the process, organizations will analyze their security...

Read More