Healthcare-secrets-on-display
Compliance and Regulatory

Your Health Secrets on Display: The Unsettling Reality of Data Breaches in Healthcare

Short on time? Listen instead. Imagine walking into a crowded room and loudly sharing your deepest health secrets. So...

Post-Quantum Encryption
Compliance and Regulatory

Congress Moving To Push Agencies To Embrace Post-Quantum Encryption

Short on time? Listen instead. In January 2022, President Biden signed a National Memorandum on Improving the Cyberse...

Privacy Violations Suit
Compliance and Regulatory

Privacy Violations Suit Provides Cautionary Tale

Short on time? Listen instead. A civil suit purporting privacy violations, filed in the U.S. Northern District of Cal...

congress-cyber-bills
Compliance and Regulatory

Three Recent Cybersecurity Bills From Congress

Short on time? Listen instead. The United States Congress has recently enacted three new cybersecurity bills to comba...

Health Application Security
Compliance and Regulatory

Health Application Security and Privacy Concerns Drive Legislative Efforts

In the United States, the protection of personal health information (PHI) is covered by the Health Insurance Portability...

What are ICS and SCADA
Compliance and Regulatory

What are ICS and SCADA, and how do they impact your medical practice?

The health care industry is an ever-changing field full of advancements, both technical and medical.  It requires a...

Risk Management Framework
Compliance and Regulatory

NIST [Cybersecurity] Risk Management Framework (RMF)

What are NIST and RMF?   The National Institute of Standards and Technology (NIST) was founded in 1901 to r...

Healthcare cybersecurity
Compliance and Regulatory

Healthcare cybersecurity regulations, laws, and resources for the healthcare professional (as of January 2021)

 (HIPAA series #4) Introduction A fundamental part of working within the healthcare industry is ensuring that the ...

Strong_Authentication
Compliance and Regulatory Cyber Breach News & Events Quick Tips

Cybersecurity Awareness Month: Authentication

Proving you are who you say you are In the world of cybersecurity, authentication means using some means to identify ...

HIPAA_Telehealth_Homeworker_Checklist
Compliance and Regulatory

HIPAA Home Worker Compliance Checklist

  Introduction Since being signed into law in 1996, the Health Insurance Portability and Accountability Act (...

hippa-data-breach
Compliance and Regulatory

What does a HIPAA Breach Look Like

The Health Insurance Portability and Accountability Act of 1996, known as HIPAA, created national standards that protect...

hippa-series-02
Compliance and Regulatory

The HITECH Act

The History of the HITECH Act Part of the American Recovery and Reinvestment Act of 2009 (ARRA), The Health Information ...