Category: Popular Posts

What Makes A HIPAA Compliant Website?

March 8, 2025

In this article, we review the requirements for what makes a HIPAA compliant website and what you need to do to ensure your website is compliant. The recent focus on tracking pixels and analytics codes by enforcement agencies has many healthcare organizations reassessing their website security and compliance. As technology has evolved over the past […]

What exactly is ePHI? Who has to worry about it? Where can it be safely located?

January 15, 2025

There is often a great deal of confusion and misinformation about what constitutes ePHI (electronic protected health information) and how to protect it under HIPAA requirements. Even once you understand ePHI and how it applies to you, the next question becomes, where is ePHI permitted? What is secure and what is not? In this post, […]

Top 5 Healthcare Email Data Breaches of 2024

December 30, 2024

In 2024, email and communication vulnerabilities continued to plague the healthcare industry. Phishing, ransomware, and email misconfigurations were at the center of several high-profile healthcare data breaches. This article highlights five of the most significant U.S. healthcare data breaches tied to communication failures, the fallout from these incidents, and actionable steps to bolster email security […]

Build Patient Trust with Email Encryption for Healthcare

December 5, 2024

For healthcare companies, consistent, clear, and personalized communication is key for enhancing patient engagement and, consequently, facilitating better health outcomes.  Another crucial component of successfully connecting with patients and customers is building trust. This in itself is a multi-faceted goal, which includes displaying empathy and respect, in addition to clear communication. A vital and practical […]

HIPAA Email Rules: What You Need to Know

October 16, 2024

The Health Insurance Portability and Accountability Act (HIPAA) is a complicated law that defines the standards for the secure collection, transmission, and storage of protected health information (PHI). When information is stored or exchanged electronically, the HIPAA Security and Privacy Rules require covered entities, i.e., organizations that handle PHI, to safeguard its integrity and confidentiality. […]