November 2nd, 2021

How to Determine Your Email Throughput Needs

When designing an email infrastructure to send high volumes of email, you need to determine your email throughput needs. Throughput refers to how much data can be transferred within a specific time frame. It is a practical measure that is influenced by many factors including server power, network speeds, concurrent connections and more. This article […]

October 12th, 2021

5 Ways to Prevent Human Impacts on Your Cybersecurity Program

There are multiple ways that humans impact cybersecurity and can put data at risk. From being tricked by phishing emails to choosing easily guessed passwords, insider fraud and mistakenly classifying the security level of emails and other content, the actions of your employees can make your data vulnerable. While the impact of human errors can’t […]

October 5th, 2021

Outbound Email Encryption for Google Workspace

Google Workspace is one of the world’s most popular email platforms. Although it is more than adequate for basic email correspondence, Gmail does not come configured to meet HIPAA email security requirements. To use Google Workspace in a HIPAA-compliant manner, you need to use a third-party connector to secure your communications.

September 28th, 2021

Online Reviews and HIPAA Compliance

Online reviews are critical for success in our modern business world. Many of us turn to online reviews when searching for a new health provider, but HIPAA compliance issues complicate how providers can use online reviews. Savvy health care marketers want to use online reviews to attract new patients. But how can they do so […]

September 21st, 2021

Why the Healthcare Industry is a Target for Cybercrime

Healthcare data seems mundane- but in the hands of a cybercriminal it can be quite valuable. Medical records contain private information that can be used to blackmail or impersonate others. Even if you aren’t a public figure with a sensitive medical condition, the financial and personal identifiers found in medical records make them a target […]