Recent Articles

  • HIPAA Prescription Theft: A Recipe for Jail

    Published On: March 19th, 2021

    Under the HIPAA Privacy Rule, healthcare workers face potential jail time for knowingly obtaining PHI without patient authorization. Recently, a New York cancer center nurse accessed patient records without [...]

  • 150,000 Security Cameras Accessed in Verkada Breach

    Published On: March 17th, 2021

    A hacktivist group gained access to Verkada’s network, exposing vulnerabilities in their security practices. More details regarding the Verkada breach are discussed. Verkada Breach Exposes Video Surveillance of Healthcare [...]

  • AMCA Settles 2019 PHI Breach With 41 State Attorneys General

    Published On: March 15th, 2021

    In 2019, the American Medical Collection Agency discovered that it was the victim of a data breach. Not just any data breach, though; the breach was the largest healthcare [...]

  • Healthcare Ransomware Attack Affects 200K

    Published On: March 11th, 2021

    Woodcreek Provider Services suffered a healthcare ransomware cyber attack affecting 200,000 patients. More details are discussed. Woodcreek Provider Services Healthcare Ransomware Attack Netgain Technology, [...]

  • Is Sendinblue HIPAA Compliant?

    Published On: March 9th, 2021

    Sendinblue is a digital marketing tool that allows businesses to send automated emails, texts, and chats, among other services. Many businesses use these types of tools to attract new [...]

  • 100K Patients Affected by Arizona Eyecare Breach

    Published On: March 8th, 2021

    A ransomware attack occurring on January 13 affected up to 100,000 eyecare patients. The Arizona eyecare breach targeted Cochise Eye and Laser, maliciously encrypting their patients’ files. More details [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.