Recent Articles

  • European Medicines Agency COVID Vaccine Data Hack

    Published On: December 22nd, 2020

    European Medicines Agency (EMA), a partner of Pfizer and BioNTech, reported that they were the victim of a cyberattack. EMA confirmed that their COVID vaccine data had been accessed [...]

  • HIPAA Cybersecurity Best Practices Incentivized in Proposed Bill 

    Published On: December 21st, 2020

    Recent legislation approved by the House Energy and Commerce Committee known as HR 7898 would require the Department of Health and Human Services (HHS) to incentivize a covered entity’s [...]

  • Dental Care Vendor Breach Affects 1 Million Patients

    Published On: December 18th, 2020

    Dental Care Alliance announced a breach affecting hundreds of their clients. More details on the dental care vendor breach are discussed. What Caused the Dental Care Vendor Breach? Dental [...]

  • 2021 Healthcare Cybersecurity Outlook Bleak

    Published On: December 17th, 2020

    According to a new study conducted by Black Book Market Research, healthcare breaches are likely to triple in the coming year. With the growing concern surrounding healthcare cybersecurity, the [...]

  • Is Marketo HIPAA Compliant?

    Published On: December 16th, 2020

    Marketo is a software provider that enables email marketing and lead management automation. But is Marketo HIPAA compliant? The answer is discussed below. Is Marketo HIPAA Compliant: Business Associate [...]

  • CMS Telehealth Expansion Made Permanent 

    Published On: December 15th, 2020

    During the coronavirus public health emergency, the Centers for Medicare and Medicaid (CMS) temporarily expanded telehealth reimbursement. However, as these temporary measures are set to expire once the public [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.