Recent Articles

  • Save Time When Conducting an OIG Criminal Background Check

    Published On: February 5th, 2025

    HR managers have admitted that they lose at least 14 hours of time per week on manual hiring and background check processes. Time-intensive manual processes cannot keep [...]

  • The Importance of Security Incident and Event Management Tools

    Published On: February 3rd, 2025

    More than 37% of U.S. healthcare organizations don’t have a security incident response plan in place. Because of this, many adverse security events go unreported. Utilizing security [...]

  • Change Healthcare Breach, Plus 12 Other Massive Breaches in 2024

    Published On: January 31st, 2025

    The Change Healthcare saga continues. When first reported, the infamous Change Healthcare data breach was thought to affect a record-breaking 100,000,000 patients. However, new reports now put [...]

  • 4 Million Patients Affected by December 2024 Healthcare Breaches

    Published On: January 29th, 2025

    December is a time for joyous celebration, but for 4 million patients, it was a rude awakening—a breach that risked their confidential information. Having your private information [...]

  • What is SOC 2 Compliance? A Guide for Healthcare Vendors

    Published On: January 27th, 2025

    With the constant threats of data breaches and cyber attacks, Service Organization Control (SOC) 2 audits represent one of the many realities of healthcare. Hospitals and patients [...]

  • Preventing Healthcare Data Breaches With Compliance Software

    Published On: January 24th, 2025

    A healthcare information breach, such as hacking or an insider threat, invades the privacy of patients who depend on your organization’s protection. Furthermore, depending on the nature or [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.