Blog
HIPAA Vulnerability Scanning: Outdated Software Risks and How to Fix Them
Use HIPAA vulnerability scanning to find outdated software, prioritize PHI risks, streamline patc...
2025 HIPAA Vulnerability Scanning Requirements: Frequency, Scope, and Documentation
Set a risk-based vulnerability scanning frequency for HIPAA compliance: practical cadences, event...
Requirements to be HIPAA Compliant
Meeting HIPAA requirements isn’t just about checking off a list—it’s about creating a culture whe...
Colorado Passes Comprehensive Privacy Legislation
Colorado Becomes the Third State to Sign a Privacy Act into Law . As of June 8th, 2021, a th...
Are You Ready For A Data Breach?
They’re More Common Than You Think. We live in an age where your doorbell records you, your phone...
GDPR Data Transfer Rules
The General Data Protection Regulation is the self proclaimed “toughest privacy and security law ...
Remote Work and Data Security
“These unprecedented times” became the catchphrase of 2020. While 2020 came with its challenges, ...
History of Data Privacy Laws
In 1877, Thomas Edison was putting the finishing touches on what he referred to as his favorite i...
Technical Safeguards of the Security Rule
The HIPAA Security Rule requires three kinds of safeguards that organizations must implement: adm...
The Principle of Least Privilege
The Principle of Least Privilege. No, this isn’t an article about a critically acclaimed tale of ...
Physical Safeguards of the Security Rule
The HIPAA Security Rule contains three types of required standards of implementation that all bus...
GDPR Penalties and Fines for Violations
If you are looking for how GDPR Fines are explained, you came to the right place! GDPR (General D...
Administrative Safeguards of the Security Rule
The HIPAA Security Rule is a set of regulations intended to protect the security of electron...
HIPAA Certification vs HIPAA Compliance
When it comes to protecting sensitive health information, understanding the difference between HI...
Working from Home and maintaining HIPAA Compliance
Ensuring Security in Remote Environments. In the age of the COVID-19 pandemic, more and more empl...
Read full article
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security