Category: LuxSci Library: Security and Privacy

Hidden Security Dangers of Google Workspace and Google Drive

November 30, 2021

Google is one of the world’s most popular email providers. Many businesses choose to utilize Google Workspace for their email communications because of their collaboration tools like Calendar, Docs, and File Sharing via Google Drive. Google Workspace includes basic privacy and security protections, but their security measures are not enough for HIPAA compliance. Even though […]

HIPAA Compliance for Mobile Apps

November 9, 2021

Many people rely on mobile devices to access the Internet, and apps are a convenient way to deliver online services. The health industry has also turned to mobile apps to provide health care services on the go. In some industries, developing apps may be relatively straightforward. However, those that deal with PHI need to understand […]

5 Ways to Prevent Human Impacts on Your Cybersecurity Program

October 12, 2021

There are multiple ways that humans impact cybersecurity and can put data at risk. From being tricked by phishing emails to choosing easily guessed passwords, insider fraud and mistakenly classifying the security level of emails and other content, the actions of your employees can make your data vulnerable. While the impact of human errors can’t […]

Why the Healthcare Industry is a Target for Cybercrime

September 21, 2021

Healthcare data seems mundane- but in the hands of a cybercriminal it can be quite valuable. Medical records contain private information that can be used to blackmail or impersonate others. Even if you aren’t a public figure with a sensitive medical condition, the financial and personal identifiers found in medical records make them a target […]

Zero Trust Email

July 20, 2021

Our third article on Zero Trust Architecture covers zero trust email and the systems it requires. In May, the Biden Administration announced a new approach to cybersecurity that included a push toward Zero Trust Architecture. We have already covered Zero Trust Architecture as a whole, and also talked about how dedicated servers are important parts […]