When designing an email infrastructure to send high volumes of email, you need to determine your email throughput needs. Throughput refers to how much data can be transferred within a specific time frame. It is a practical measure that is influenced by many factors including server power, network speeds, concurrent connections and more. This article […]
Creating a website that has “secure” components requires more than slapping together some web pages and adding an SSL Certificate. All a certificate does is create a thin veneer of security. It does not go very far to protect whatever sensitive data necessitated security in the first place. In fact, naive attempts at security can […]
There are multiple ways that humans impact cybersecurity and can put data at risk. From being tricked by phishing emails to choosing easily guessed passwords, insider fraud and mistakenly classifying the security level of emails and other content, the actions of your employees can make your data vulnerable. While the impact of human errors can’t […]
Google Workspace is one of the world’s most popular email platforms. Although it is more than adequate for basic email correspondence, Gmail does not come configured to meet HIPAA email security requirements. To use Google Workspace in a HIPAA-compliant manner, you need to use a third-party connector to secure your communications.
Online reviews are critical for success in our modern business world. Many of us turn to online reviews when searching for a new health provider, but HIPAA compliance issues complicate how providers can use online reviews. Savvy health care marketers want to use online reviews to attract new patients. But how can they do so […]