April 5th, 2022

Is Email Archival Required by HIPAA?

Customers often inquire if email archival is required by HIPAA regulations. There is a great deal of confusion and uncertainty here because: HIPAA lists many requirements, but does not provide specific instructions on how to implement them. It’s ambiguous, but provides a great deal of flexibility for organizations. Email archival adds a fixed cost to […]

March 29th, 2022

Promoting Health Literacy with Email Engagement

In the final installment of our series on using digital technology for patient engagement, we discuss how email can promote health literacy and help patients manage chronic conditions. Patient Education and Health Literacy Chronic diseases like diabetes and heart disease require a high degree of health literacy to manage effectively at home. Health literacy is the […]

March 22nd, 2022

Improve Access to Preventative Healthcare with Email

Next up in our series on patient education and engagement, we look at ways to encourage preventative healthcare with digital technologies.   Vaccines and Flu Shot Information It’s challenging to encourage individuals to get a yearly flu shot. There are many reasons that people do not get annual flu shots. Some of these reasons include: […]

March 15th, 2022

Engage Patients with Educational Messaging

Educating patients about their upcoming medical procedures is an important part of building trust and increasing retention. Using digital technologies to educate patients is just one way to reinforce messaging and improve patient compliance. This article provides some examples of how to digitally engage with patients both before and after undergoing a medical procedure.

March 8th, 2022

Implementing Zero Trust Architecture

The US Government has released its zero trust strategy to help government agencies implement zero trust architectures. It requires federal agencies to meet certain standards before the end of the 2024 fiscal year. The zero trust strategy aims to improve the nation’s security posture and reduce the potential harms from cyber attacks. It assumes that […]