LuxSci Library: Security and Privacy
- 10 Tips for Preventing Ransomware Attacks
- 2021 Year in Review
- 30th National HIPAA Summit Recap
- 4 Security Tips for Cybersecurity Awareness Month
- 5 New Year’s Resolutions to Improve Your Cybersecurity
- 5 Ways to Prevent Human Impacts on Your Cybersecurity Program
- 7 Common Misconceptions about DKIM in the Fight Against SPAM
- 8 Ways to Protect yourself from Forged/Fake Email
- A Brief Guide to HIPAA-Compliant SMTP Relaying
- AI Threats to Email Security
- Application Specific Passwords / Login Aliases at LuxSci
- Are Export-Grade Encryption Options Needed Anymore?
- Are you Minimizing your Risk by using the Next Generation of Opt In Email Encryption?
- Best Practices for Minimizing the Impact of Social Engineering on Your Organization
- Business Continuity Planning: RTO vs RPO
- Can you really be sure if an email message was transmitted using TLS?
- Can You Save Money by Spending on Security?
- Creating Secure Web Forms: What You Need to Know
- Cyber Espionage Infiltrates American Small Business
- Do I need to Buy an SSL Certificate to use Secure Email?
- Do you need a VPN for Secure Email in a Wireless Hotspot?
- DuoSecurity: Advanced Two-Factor Login for LuxSci’s Web Interface
- Email, Calls, Messaging Apps & More: How Can You Secure It All?
- Enable HSTS (HTTP Strict Transport Security) at LuxSci
- Encrypted Flash Drive: Why You Need One and What Are Your Options
- Encrypting Sent Email — An Often Overlooked Part of End-to-End Encryption
- Enforcing Email Security with TLS when Communicating with Banks
- Enhanced Security: AES-256 Encryption for SSL and TLS
- Enhancements to Application-specific Passwords
- Futureproof Your Data Loss Prevention Strategy with Always On Email Encryption
- GDPR & Email: 10 Critical Questions & Answers for Compliance
- HaveIBeenPwned? Selecting passwords that are not known to Hackers
- Hidden Security Dangers of Google Workspace and Google Drive
- HIPAA 2010: HITECH Impact on Email and Web Outsourcing
- HIPAA Compliance for Mobile Apps
- HIPAA Compliant Email – You Decide Which Messages Need Encryption
- HIPAA Email: Does it Require Encryption?
- HIPAA-Compliant Secure Email: Understanding Encryption
- HIPAA-Compliant Web Sites: Requirements and Best Practices
- How Does Secure Socket Layer (SSL or TLS) Work?
- How Secure are Password-Protected Files?
- How Strong Data Security Can Be a Competitive Advantage for Your Organization
- How to Avoid Business Email Compromise Attacks
- How to Evaluate any New Software or Service for HIPAA Compliance
- How to Secure SMTP Email Delivery with TLS
- How to Tell If Someone Read Your Email: Read Receipts and Web Bugs
- How to Tell Who Supports SMTP TLS for Email Transmission
- If you are using FTP, you should really stop!
- Implementing Zero Trust Architecture
- Improve Account Security by Enabling Multifactor Authentication
- Increasing Resiliency with Data Backups
- Infographic – SSL vs TLS: What is the Difference?
- Is the Email Encrypted? How to Tell if an Email is Transmitted Using TLS
- Is TLS Email Encryption Suitable for Compliance?
- Is your Accountant protecting your privacy and identity?
- Login security & passwords – yesterday, today and tomorrow
- LuxSci is Fully PCI Compliant
- Medical Device Cybersecurity Standards Are on the Way
- Mitigating Threats To Your Email Security and Privacy
- Neutralizing and protecting against rogue TLS certificates in the wild
- Next Generation Data Loss Prevention (DLP) with LuxSci Secure Email
- Opportunistic TLS vs Forced TLS for SMTP
- Patient Privacy Issues with Unencrypted Email
- PGP Encryption
- Pretexting: The Latest Threat to Email Security
- Restrict User WebMail Access by IP
- Safe Family Email with LuxSci Parental Controls
- SecureLine Offers TLS-Only Enforced Outbound Email Encryption
- SIM-Swapping: Why SMS Authentication Is a Bad Idea
- SSL versus TLS – What’s the difference?
- Stronger Email Security with SMTP MTA STS: Strict Transport Security
- The Case For Email Security
- The Cybersecurity Risks of Mergers and Acquisitions
- The first 7 steps to recovering from a ransomware attack
- The Future of Protected Health Information
- The Security Risks of Staffing Challenges
- Tips for Improving Account Security
- TLS 1.0 to 1.2 and NIST TLS Cipher Updates: Email Program and Web Browser Compatibility Issues
- Tracing the Origin of an Email Message — and Hiding it
- Trust Seals & Their Impact on Sales: Things You Should Know
- Ultimate Control: Manage Access to Your Services with Custom Firewalls
- Want to Keep Your Passwords Safe & Your Accounts Protected? Here’s How
- What End-to-End Email Encryption Really Means
- What is Cyber Insurance?
- What is HITRUST Certification and Why Does It Matter?
- What is really protected by SSL and TLS?
- What Is Smishing And How Can You Avoid It?
- What is TLS? Secure Email 101
- What Is Zero Trust Architecture?
- What Level of SSL or TLS is Required for HIPAA Compliance?
- What’s the latest with HTTPS and SSL/TLS Certificates?
- Why Are Hackers Targeting Your Medical Records?
- Why Choose OV TLS Certificates? The dilemma of the middle child
- Why Should You Bother with Information Security? Isn’t Everything Hackable Anyway?
- Why the Healthcare Industry is a Target for Cybercrime
- Will Email Ever Be Truly Secure?
- Zero Trust and Dedicated Servers
- Zero Trust Email