Cybersecurity Blog
Browse our collection of Cybersecurity articles and resources
CDS Hooks Security Guide: OAuth 2.0, JWTs, and Best Practices
CDS Hooks Security Model Overview. CDS Hooks enables an EHR (the CDS client) to call an external...
The Complete Guide to Healthcare Security Awareness: Staff Training, Best Practices, and HIPAA Compliance
Healthcare security awareness protects patient trust, reduces breach risk, and keeps you complian...
How to Strengthen Rural Healthcare IT Infrastructure Security: Risks, Compliance, and Best Practices
Common Security Risks. Rural healthcare organizations face the same adversaries as large systems...
Anti-Malware for Healthcare: Best Practices, HIPAA Compliance, and Top Solutions
Implement Multi-Layered Security Measures. Effective anti-malware for healthcare hinges on defen...
Cybersecurity Checklist for Healthcare NLP Companies HIPAA, PHI, and AI Security Essentials
This cybersecurity checklist for healthcare NLP companies distills HIPAA, PHI, and AI security es...
Medical Waste Disposal Company Cybersecurity Checklist: Protect PHI and Stay Compliant
Medical waste disposal operations touch Protected Health Information (PHI) at clinics, in transit...
Healthcare Baiting Attacks: Definition, Real-World Examples, and How to Prevent Them
Healthcare baiting attacks are a form of social engineering that plant an enticing “lure”—often a...
PE-Backed Medical Practice Cybersecurity: Best Practices to Protect PHI and Ensure Compliance
Private equity ownership can accelerate growth for medical groups—but it also expands the attack ...
Cybersecurity for Critical Access Medical Practices: Best Practices and Compliance Essentials
Cybersecurity for critical access medical practices protects patient trust, keeps operations runn...
HC3 Analyst Note: Latest Healthcare Sector Cyber Threat Intelligence and Key Takeaways
Overview of Healthcare Sector Cyber Threats. This HC3 Analyst Note: Latest Healthcare Sector Cyb...
Network Security Best Practices for Medical Billing Companies: Protect Patient Data and Stay HIPAA-Compliant
Endpoint Implementation. Harden every workstation, laptop, and mobile device that accesses Elect...
Securing Equipment Maintenance in Healthcare: Best Practices for Safety, Compliance, and Cybersecurity
Comprehensive Asset Management. Build a real-time medical equipment inventory. A complete, accu...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security