October 10th, 2023

How Online Tracking Technologies & Data Collection Threaten Patient Privacy

Many healthcare marketers use online tracking technologies to gather user information as they interact with a website or mobile application. After several breaches tied to improper uses of third-party tracking pixels, the Department of Health and Human Services has clarified that data collected via online tracking technologies are often PHI and must be secured according […]

October 3rd, 2023

What are Secure Email APIs?

APIs are just one tool that organizations can use to streamline operations and automate processes. Healthcare organizations can utilize secure email APIs to save time and streamline their operations. This article explains what secure email APIs are and ways that healthcare organizations can use them while maintaining HIPAA compliance. What is an API? First, let’s […]

September 26th, 2023

What is HIPAA-Compliant Email Marketing?

If you are one of the 92% of Americans with an email address, you are likely familiar with email marketing. It is a tried and true marketing strategy that delivers a superior return on investment compared to other digital channels. However, when healthcare organizations want to utilize these strategies, out-of-the-box solutions are not a good […]

September 19th, 2023

Is TLS Email Encryption Suitable for Compliance?

This article discusses what types of email encryption are sufficient to comply with government regulations. TLS email encryption is a good option for many organizations that manage sensitive data. However, it does not protect data at rest. Each organization must perform a risk assessment to determine which encryption methods suit their legal requirements.

September 12th, 2023

Creating Secure Web Forms: What You Need to Know

Creating secure web forms starts with creating a secure website. This process is more complex than creating web pages and adding an SSL Certificate. A certificate is a solid first step, but it only goes so far as to protect whatever sensitive data necessitates security in the first place. Naive attempts at security can ultimately […]