How to Determine Your Email Throughput Needs
When designing an email infrastructure to send high volumes of email, you need to determine your email throughput needs. Throughput refers to how much data can be transferred within a specific time frame. It is a practical measure that is influenced by many factors including server power, network speeds, concurrent connections and more. This article […]
5 Ways to Prevent Human Impacts on Your Cybersecurity Program
There are multiple ways that humans impact cybersecurity and can put data at risk. From being tricked by phishing emails to choosing easily guessed passwords, insider fraud and mistakenly classifying the security level of emails and other content, the actions of your employees can make your data vulnerable. While the impact of human errors can’t […]
Outbound Email Encryption for Google Workspace
Google Workspace is one of the world’s most popular email platforms. Although it is more than adequate for basic email correspondence, Gmail does not come configured to meet HIPAA email security requirements. To use Google Workspace in a HIPAA-compliant manner, you need to use a third-party connector to secure your communications.
Online Reviews and HIPAA Compliance
Online reviews are critical for success in our modern business world. Many of us turn to online reviews when searching for a new health provider, but HIPAA compliance issues complicate how providers can use online reviews. Savvy health care marketers want to use online reviews to attract new patients. But how can they do so […]
Why the Healthcare Industry is a Target for Cybercrime
Healthcare data seems mundane- but in the hands of a cybercriminal it can be quite valuable. Medical records contain private information that can be used to blackmail or impersonate others. Even if you aren’t a public figure with a sensitive medical condition, the financial and personal identifiers found in medical records make them a target […]