August 2nd, 2022

Email List Hygiene: 5 Best Practices for Cleaning Up Email Lists

When sending emails from a new server and IP address, we always stress the importance of warming up the server to prevent emails from being flagged as spam. One critical step of the warm up is sending small batches of messages to email contacts that are likely to open and click on the content. Sending […]

July 26th, 2022

New Feature: Custom Bounce Domains

LuxSci has introduced a new feature to improve reporting for bounced transactional and marketing messages. The new “Custom Bounce Domains” feature allows administrators to set a custom domain for bounce processing that will not break DMARC. What is DMARC? DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. It protects users from forged emails and […]

July 19th, 2022

What is a Digital Front Door?

Patient engagement is a growing concern in today’s healthcare ecosystem. As many providers transitioned to telehealth during the pandemic, the concept of a “digital front door” evolved to describe how patients interact digitally with healthcare providers. Definition The term “digital front door” describes an omnichannel engagement strategy that leverages technology to meet the needs of […]

July 12th, 2022

Is Microsoft Teams HIPAA-Compliant?

Microsoft Teams is a unified communication platform with workplace chat, video conferencing, and file-sharing tools. It’s a popular program for internal workplace communications. However, healthcare organizations may wonder if they can use it while complying with HIPAA. Microsoft Teams is designed to work with Microsoft 365 and additional Microsoft products. As readers of this blog […]

July 5th, 2022

How to Avoid Business Email Compromise Attacks

Business email compromise (BEC) attacks are on the rise and are poised to eclipse ransomware as the biggest threat to cybersecurity. Since 2016, $43 billion has been stolen through BEC. Even more concerning, there has been a 65% increase in BEC from 2019 to 2021. This article explores what business email compromise scams are and […]