July 17th, 2023

New From LuxSci: Updates to the WebMail Portal

LuxSci is pleased to announce that the first phase of design and user experience improvements has been deployed on the LuxSci WebMail portal. In the first phase of updates, you will notice significant changes to the main navigation and organization of the portal. These developments reflect our commitment to: Supporting customers’ business workflows and processes […]

July 13th, 2023

How to Overcome Email Encryption Challenges

If your business transmits sensitive information via email, encryption is often required to meet compliance standards. However, if encryption is difficult to use, employees and recipients alike may avoid secure channels and communicate sensitive information insecurely. Email encryption technology must be intuitive for employees to use and easy for recipients to decrypt to encourage adoption. […]

July 5th, 2023

Digital Strategies to Address Health Equity

According to a HIMSS Market Insights study, nine out of ten healthcare executives see health equity as a top business priority. Improving health equity can drive value for other business metrics, including patient satisfaction, provider retention, health outcomes, and cost reduction. Email is an excellent way to address health equity issues, thanks to its widespread […]

June 22nd, 2023

Patient Engagement: Why Email is an Essential Channel

In today’s increasingly digital world, email is often overlooked as a channel for patient engagement. Email may not appear to be as innovative or exciting as texting, social media, or mobile applications. Nevertheless, email is a powerful tool that remains widely popular and accessible to most of the population, making it an essential channel for […]

June 12th, 2023

Pretexting: The Latest Threat to Email Security

Verizon recently released its 2023 Data Breach Investigations Report- a comprehensive review of breaches and security incidents occurring over the last year. One surprising finding was a sharp rise in pretexting attacks. To properly respond to these threats, security professionals must understand the risks and prepare for exploitation attempts. What is a Pretexting Attack? A […]