Recent Articles

  • Importance of Vendor Due Diligence Highlighted by Breach

    Published On: January 28th, 2021

    It was recently announced that Bonobos, a subsidiary of Walmart, was the victim of a breach that exposed the personal information of millions of their customers. However, hackers did [...]

  • Blackbaud Breach Victim Files Lawsuit Under California Healthcare Law

    Published On: January 27th, 2021

    The Blackbaud breach is infamous for the sheer amount of organizations the incident affected. Among hundreds of affected organizations were several in the healthcare industry, compromising the protected [...]

  • Guidance on HIPAA and Cloud Computing: How Can You Use Cloud Software and Comply with HIPAA?

    Published On: January 26th, 2021

    Cloud computing allows users to access data stored in the cloud from anywhere with an internet connection. Because of its ease of use, using the cloud to store business [...]

  • 640k Patients Affected By Hendrick Health Breach

    Published On: January 25th, 2021

    On January 15, Hendrick Health System began notifying 640,436 patients of a cybersecurity threat that compromised their data. More details on the incident are discussed below. What Caused the [...]

  • 2021 Healthcare Cybersecurity Expectations

    Published On: January 22nd, 2021

    We previously wrote about the new proposed cybersecurity incentive law, HR 7898, that is aimed at making the healthcare industry more focused on keeping patient information secure. But what [...]

  • OCR Enforcement Discretion and COVID Vaccination

    Published On: January 21st, 2021

    Since the release of the COVID-19 vaccine, healthcare organizations have scrambled to provide patients with timely vaccination. With the difficulties in scheduling vaccines, some providers have turned to non-traditional [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.