Blog
HIPAA Vulnerability Scanning: Outdated Software Risks and How to Fix Them
Use HIPAA vulnerability scanning to find outdated software, prioritize PHI risks, streamline patc...
2025 HIPAA Vulnerability Scanning Requirements: Frequency, Scope, and Documentation
Set a risk-based vulnerability scanning frequency for HIPAA compliance: practical cadences, event...
Telemedicine Informed Consent Requirements by State: 2026 Guide
Informed Consent Mandates. Telemedicine informed consent requirements vary by state, but nearly ...
Is Athenahealth HIPAA Compliant? Security Measures and Compliance Overview
HIPAA Compliance Overview. Yes—Athenahealth can be used in a HIPAA-compliant manner when you exe...
HIPAA Risk Assessment for Personal Care Aides: Step-by-Step Checklist and Compliance Tips
Conducting HIPAA Risk Assessments. As a personal care aide, you routinely handle Protected Healt...
Is Headspace Health HIPAA Compliant? Here’s What to Know
Short answer: yes—when you engage with Headspace Health for clinical services delivered through a...
HIPAA Compliance Training for Wellness Coordinators: Complete Guide & Certification Options
HIPAA Applicability to Wellness Coordinators. Whether HIPAA applies to your wellness role depend...
How to Do HIPAA-Compliant Vulnerability Scanning for Your Therapy Office
Your therapy office handles electronic protected health information (ePHI) every day. HIPAA doesn...
How to Run HIPAA-Compliant Penetration Testing and Phishing Simulations
You can run HIPAA‑compliant penetration testing and phishing simulations by aligning every action...
HIPAA Penetration Testing for Health Tech Startups: A Complete Guide
HIPAA Compliance Requirements. Where penetration testing fits. HIPAA sets outcomes, not step-by...
SSL/TLS Certificate Vulnerability Scanning for HIPAA Compliance
Understanding HIPAA Requirements for ePHI Transmission. HIPAA’s Security Rule requires you to pr...
HIPAA Contingency Plan Requirements: A Practical Compliance Checklist
HIPAA Contingency Plan Requirements center on one objective: keep care moving while protecting el...
How to Protect Data in Lyme Disease Clinical Trials: Privacy, Security, and Compliance
Implement Data Privacy Policies. To protect data in Lyme disease clinical trials, start with cle...
How to Respond to a CMS Audit: Step-by-Step Guide, Timeline, and Sample Letter
Understanding CMS Audits. A Centers for Medicare & Medicaid Services (CMS) audit examines wh...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security