Skip to main content

Privacy & Security

SPONSORED
By Carahsoft | 06:00 am | December 13, 2023
Explore the benefits of private AI architecture for your organization.
By Adam Ang | 02:47 am | December 12, 2023
They are vulnerable to email fraud and domain spoofing. 
By Andrea Fox | 03:39 pm | December 11, 2023
"Your data has been stolen and will soon be sold to various data brokers and black markets to be used in fraud and other criminals," the alleged attackers say in an email sent directly to one patient.
By Andrea Fox | 02:09 pm | December 08, 2023
This agency's first data breach settlement under HIPAA for a phishing attack involved the alleged failure to conduct a risk analysis to identify potential ePHI threats or vulnerabilities across the Lafourche Medical Group network.
By Andrea Fox | 11:35 am | December 08, 2023
"The AHA cannot support proposals for mandatory cybersecurity requirements being levied on hospitals as if they were at fault for the success of hackers in perpetrating a crime," says Rick Pollack, president and CEO of the American Hospital Association.
By Jeff Lagasse | 05:50 pm | December 06, 2023
Members impacted by the breach are being provided with no-cost credit monitoring and identity restoration services.
By Andrea Fox | 12:59 pm | December 05, 2023
According to court documents and public reporting, Vladimir Dunaev provided specialized services and technical abilities in furtherance of the Trickbot scheme.
By Neil Versel | 10:31 pm | December 04, 2023
Some healthcare organizations use homegrown tracking technologies to avoid third-party disclosures of protected information, but all have to understand if their practices comply with applicable privacy laws, says Betsy Hodge, partner at Akerman.
By Andrea Fox | 04:02 pm | December 04, 2023
The organization reported that it detected intrusion over the Thanksgiving holiday. All clinics and the MyChart patient portal are operating.
By Andrea Fox | 11:58 am | December 04, 2023
"When we see a vulnerability or intrusion campaign that could have been reasonably avoided if the software manufacturer had aligned to secure by design principles, we’ll call it out," writes CISA cybersecurity leaders Eric Goldstein and Bob Lord.

Newsletter Signup