In this blog, we will discuss what a long-term care facility is and how they bill their patients. We will also talk about the main steps that occur when the billing process starts, and common challenges faced.
In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Here are a few phishing email examples and tactics that came straight out of our own inboxes. Luckily, none of these examples led to a breach or malicious attack.
When evaluating the current state of your cybersecurity environment, healthcare companies need to ask themselves specific questions to evaluate themselves.
As healthcare practices scramble to protect their cybersecurity, some have already faced their worst nightmare. Here’s our massive list of the most devastating healthcare ransomware attacks in 2019.
Implanted medical devices are objects fixed into the body to assist with function. They often lack adequate security because their wireless antennas don’t encrypt data. This increases the likelihood of a hack.