Blog
HIPAA-Compliant Pharmacy Endpoint Protection for POS and Dispensing Systems
Secure endpoint protection for pharmacies: protect POS, dispensing systems, and ePHI with hardene...
HIPAA Compliance Responsibility Assignment: Roles, RACI Matrix, and Templates
Improve HIPAA compliance by assigning clear owners, using a RACI matrix, enforcing safeguards, an...
How to Build a HIPAA-Compliant Privacy Program for Healthcare IT Companies
As a healthcare IT company, you handle Protected Health Information (PHI) for covered entities an...
OIG Exclusion Screening: A Healthcare Compliance Officer’s Guide to Requirements and Best Practices
Understanding OIG Exclusions. What OIG exclusions mean for your organization. The Office of Ins...
Post-Exploitation in Healthcare: How to Detect, Contain, and Recover from Breaches
Post-Exploitation Activities in Healthcare. What adversaries do after initial compromise. In th...
Common HIPAA Violations Paramedics Should Know About—and How to Avoid Them
Field medicine moves fast, but privacy obligations still apply. This guide highlights common HIPA...
HIPAA Compliant Video Surveillance: Requirements, Checklist, and Best Practices
Implementing HIPAA compliant video surveillance helps you protect patients, satisfy regulatory re...
Network Security Best Practices for Imaging Centers: Keep PACS, DICOM, and Patient Data Secure
Network Segmentation for PACS. Segmentation limits blast radius and keeps modalities, PACS, and ...
New York Telehealth Regulations: 2026 Compliance Guide for Providers
Telehealth Definition and Scope. Telehealth in New York encompasses delivering care at a distanc...
10 Common Healthcare Cloud Security Mistakes and How to Avoid Them
Cloud Misconfigurations. Cloud Infrastructure Misconfigurations are a leading cause of healthcar...
HIPAA Breach Notification to the Media: Requirements, Timelines, and How to Comply
Media Notification Requirement. Under the HIPAA Breach Notification Rule, covered entities must ...
HIPAA Risk Analysis vs. Risk Assessment: What’s the Difference and Which Do You Need?
Defining HIPAA Risk Analysis. Under the HIPAA Security Rule, a risk analysis is an accurate and ...
Depression Telehealth Privacy: How Secure and Confidential Is Your Online Therapy?
When you meet a therapist online for depression care, your privacy rests on laws, platform safegu...
Healthcare Vendor Risk Scoring: Methodology, Criteria, and Best Practices
Vendor Risk Scoring Methodology. Overview. Effective healthcare vendor risk scoring gives you a...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security