August 8th, 2023

7 Essential Steps to Creating a HIPAA Website

The recent focus on tracking pixels and analytics codes by enforcement agencies has many healthcare organizations reassessing their website security and compliance. As technology has evolved over the past thirty years, HIPAA rules have adapted to secure sensitive data. In this article, we review the requirements for HIPAA websites and what you need to do […]

August 1st, 2023

HIPAA Email Rules: 8 Requirements for Secure Email

The Health Insurance Portability and Accountability Act (HIPAA) is a complicated law that sets the standards for collecting, transmitting, and storing protected health information (PHI). When information is stored or exchanged electronically, the HIPAA Security and Privacy Rules require covered entities to safeguard its integrity and confidentiality. One of the most common ways that PHI is […]

July 24th, 2023

Fuel Your Cross-Channel Marketing Strategy with Email

Moving to an omnichannel or multichannel marketing strategy requires time and investment. However, you don’t have to reinvent the wheel to drive behavior and achieve results. For reasons we will explore in this article, email is a powerful tool in patient engagement and driving a successful cross-channel marketing strategy. Email is Everywhere One of the […]

July 17th, 2023

New From LuxSci: Updates to the WebMail Portal

LuxSci is pleased to announce that the first phase of design and user experience improvements has been deployed on the LuxSci WebMail portal. In the first phase of updates, you will notice significant changes to the main navigation and organization of the portal. These developments reflect our commitment to: Supporting customers’ business workflows and processes […]

July 13th, 2023

How to Overcome Email Encryption Challenges

If your business transmits sensitive information via email, encryption is often required to meet compliance standards. However, if encryption is difficult to use, employees and recipients alike may avoid secure channels and communicate sensitive information insecurely. Email encryption technology must be intuitive for employees to use and easy for recipients to decrypt to encourage adoption. […]