Our free tools and educational resources come from the top compliance experts in the country who are working with us to help you succeed. The healthcare compliance resources below give you the tools you need to start assessing your compliance status. Please feel free to download and utilize our healthcare compliance resources – or contact us directly if you have any questions about becoming compliant.
Stay Updated on the Latest Compliance News
Phishing Attacks on the Rise
Hackers utilizing phishing attacks disguise themselves as a trusted entity, to send their victims links with malicious content, either through email, text, or instant message. When the receiver clicks the link, hackers are able [...]
The Importance of HIPAA Compliance for Home Healthcare
Now, do not let the title fool you. We are not trying to say that HIPAA compliance matters more for Home Health agencies. HIPAA is still a federal regulation, which all organizations within the [...]
Breach of LabCorp and Quest Diagnostics Puts a Spotlight on HIPAA Vendor Oversight
Cybersecurity should be at the top of the list or priorities for anyone working in the healthcare industry. Unfortunately, cyberattacks in healthcare are a growing concern. A cyberattack occurs when a [...]
LVHN Sued for Privacy Breach
Recently, the Pennsylvania Department of Health cited the Lehigh Valley Health Network (LVHN) for failure to protect personal health information (PHI). A May 2019 Department of Health inspection concluded that LVHN committed a privacy [...]
HIPAA Cloud Requirements Providers Must Meet
The adoption of cloud computing, especially in the healthcare industry, is widespread. Using a HIPAA cloud service allows users to access their data from multiple devices anywhere that has internet, making traditional [...]
Phishing Attacks Compromise the PHI of Thousands
Phishing attacks can be difficult to detect by nature. Attackers disguise themselves as a trusted entity, and send their victims links with malicious content, either through email, text, or instant message. When the receiver [...]
















