Of the 229 breaches added this year to the HHS “wall of shame”, the largest one is the attack on UnityPoint Health. The Iowan company fell victim to a business email compromise (BEC) attack that compromised its business email system. How big is the UnityPoint Health data breach? As per… Continue Reading Business Email Compromise – How it Works?

“According to Varonis, 41% of organizations had more than 1,000 sensitive files open to every employee, with data such as “credit card information, health records, or personal information subject to regulations like GDPR, HIPAA and PCI” readily available to anyone with access to the system.” By Jonathan Greig, Tech Republic… Continue Reading Global accessibility – A Mistake Healthcare Providers Cannot Afford

The rapid rise in use of computer networks to process, store and exchange the patient health information has made it easy for the health providers to speed up and improve the quality standards of their services. The seamless connectivity that internet provides, makes it easy for patients to access their medical… Continue Reading HIPAA Compliance: Using Encryption for Safe and Secure Management of Patient Health information