Author: Pablo Bullian

Illustration of a coputer demonstrating healthcare cybersecurity challenges with the text "Securing ePHI in the Age of Digital Health Tools to the left.
Securing ePHI in the Age of Digital Health Tools is a three-part blog series that explores how healthcare providers can protect PHI and mitigate healthcare data security risks associated with patient engagement technologies by implementing the right security protocols. Read parts two and three now. Supply chain attacks are a…

Illustration of healthcare application security measures with the text "Securing ePHI in the Age of Digital Health Tools" to the left.
Securing ePHI in the Age of Digital Health Tools is a three-part blog series that explores how healthcare providers can protect PHI and mitigate healthcare data security risks associated with patient engagement technologies by implementing the right security protocols. Read parts one and three now. In the first article of…

Illustration of a cell phone with a login for securing patient data and the text "Securing ePHI in the Age of Digital Health Tools" to the left
Securing ePHI in the Age of Digital Health Tools is a three-part blog series that explores how healthcare providers can protect PHI and mitigate healthcare data security risks associated with patient engagement technologies by implementing the right security protocols. Read parts one and two now. Patient engagement technology is in…

patient data access
Data privacy has become a major issue in today’s digitalized world, and with around 80% of all US health records[¹] now stored in digital form, the issue has sparked ongoing debates in the healthcare sector as well. While the government has attempted to guard this sensitive health information through regulatory…

blog thumbnail
Healthcare organizations strive to provide the best patient engagement experience possible. In order to do this, many organizations result in implementing piecemealed solutions to provide all the features patients demand today. In-demand features include: Patient self-scheduling software Patient check-in software HIPAA compliant appointment reminders Telehealth Patient education HIPAA compliant messaging…

blog thumbnail img
Updated on November 24th, 2021. This is the second part of our three-part series discussing the Security Rule section of HIPAA compliant healthcare application development. Here we’ll go over HIPAA auditing, what it means, why it must be done, the implications of not doing so, and how you should conduct…

blog img thumbnail
Updated on July 23, 2020. Of the three main components of HIPAA (the Privacy Rule, Security Rule, and Breach Notification Rule) the Security Rule is particularly relevant to healthcare mobile app development. The majority of these applications, from patient portals to mhealth apps, store or transmit electronic protected health information…
  • 1(current)
Pablo Bullian
Pablo Bullian

Pablo Bullian (CISO) Pablo manages Bridge’s IT security policies and HIPAA-compliant hosting infrastructure. He holds an M.S. in Cybersecurity, is an associate professor of cybersecurity engineering, and holds various certifications in cybersecurity and networking.