January 18th, 2019

2018 Cybersecurity: Breaches, Online Trends & What Lies Ahead

2018 has come a close and cybersecurity is more relevant than ever. As we continue to move more of our work and personal lives online, our defenses are becoming even more critical parts of holding our world together. When these defenses are inadequate, we see a range of devastating results. From big data breaches to […]

January 10th, 2019

What You Need To Know About the HIPAA Security Rule

In this day and age of rampant cybercrime, protecting a patient’s electronic health information is of the utmost importance. But, how do you know if the protections are adequate? Well, that’s where the HIPAA Security Rule comes in. What is the difference between the privacy and security of health information? With respect to health information, […]

December 11th, 2018

Secure Email for Healthcare: How To Ensure You’re Not At Risk

Email is the most convenient way of communicating with patients. HIPAA permits email communications but expects covered entities to take the necessary precautions to protect the integrity and security of patient health information shared via email. HIPAA email rules HIPAA email rules require covered entities to implement controls and security to restrict access to PHI, […]

December 4th, 2018

Penetration Testing for HIPAA Compliance

Back in the day, the most important concern for a healthcare organization was to provide the best quality of life for its patients and to promote health awareness. However, in this day and age, healthcare organizations also need to worry about protecting patient information.  Some of this is identifiable and sensitive — PHI or Protected […]

November 27th, 2018

What is TLS? Secure Email 101

Transport Layer Security (TLS) is a widely used protocol in email security, the other being Secure Sockets Layer (SSL). Both are used to encrypt a communication channel between two computers over the internet. An email client uses the Transport Control Protocol (TCP) – which enables two hosts to establish a connection and exchange data – […]