Blog
HIPAA Vulnerability Scanning: Outdated Software Risks and How to Fix Them
Use HIPAA vulnerability scanning to find outdated software, prioritize PHI risks, streamline patc...
2025 HIPAA Vulnerability Scanning Requirements: Frequency, Scope, and Documentation
Set a risk-based vulnerability scanning frequency for HIPAA compliance: practical cadences, event...
Key Elements Required for a Valid HIPAA Authorization Explained
A HIPAA authorization lets you direct a covered entity to use or share your Protected Health Info...
How Mandatory Are Security Awareness Programs Under HIPAA?
HIPAA Security Rule Requirements. What the Rule Says. Under the HIPAA Security Rule’s administr...
Understanding the Process of Revoking HIPAA Authorizations
Revoking a HIPAA authorization lets you stop future uses and disclosures of your Protected Health...
Guidelines for HIPAA-Compliant De-identification of PHI
To responsibly use Protected Health Information, you must apply de-identification standards that ...
Common HIPAA Violations and How to Avoid Them
HIPAA sets national standards for safeguarding Protected Health Information (PHI) across privacy,...
Essential Components of a HIPAA Compliance Program: A Comprehensive Guide
A well-built HIPAA compliance program protects the confidentiality, integrity, and availability o...
Guide to Filing an Anonymous HIPAA Complaint: Protecting Your Identity
Filing an anonymous HIPAA complaint lets you report serious concerns while keeping your name out ...
Implementing HIPAA Administrative Safeguards: A Guide for Covered Entities
HIPAA Administrative Safeguards set the management, policy, and workforce foundations that keep p...
Navigating the Necessity of Business Associate Agreements Under HIPAA
Definition of Business Associate. Who qualifies and what they do. A business associate is any p...
What's Healthcare GRC?
Why it's important for a modern healthcare business . In this blog post, we will delve into the c...
Exploring HIPAA's Three Essential Safeguards: Administrative, Physical, and Technical
HIPAA organizes security around three pillars—administrative, physical, and technical safeguards....
Ultimate Guide to Free HIPAA-Compliant File Sharing Solutions
Overview of HIPAA Compliance Requirements. HIPAA governs how you create, receive, maintain, and ...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security