


How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become increasingly more sophisticated, so have attackers’ methods. According to the U.S. Department of Health and Human Services (HHS), incidents of hacking affecting 500 people or more...
Microsoft Announces End of Support for Internet Explorer
Internet Explorer was once one of the biggest players in the browser game, but now it’s coming to its end of days. Starting June 15, 2022, Microsoft will end support of Internet Explorer 11 (IE 11), the last major version of Internet Explorer, and will discontinue the...
Protected Health Information (PHI): Everything You Need to Know about HIPAA and PHI
What is Protected Health Information (PHI)? The Health Insurance Portability and Accountability Act (HIPAA) is a 1996 federal law that regulates privacy standards in the healthcare sector. In the early 1990s, it became clear that computers and digital records would...
What is NIST 800-50 and How Should It Inform Your HIPAA Training?
For organizations that deal with sensitive client or employee information, (e.g., Medical Practices, Employer Groups, Business Associates, and Business Associate Subcontractors) developing a robust security plan is a necessary investment when it comes to data...