Blog

Recovering from ransomware
November 17, 2020 • By Erik Kangas

The first 7 steps to recovering from a ransomware attack

If you have been affected by a ransomware attack, we have compiled some guidance to help you get started with your recovery process.  These steps are simple and quick and will get you going in the right direction until you have a professional team on your side to help you emerge confidently from...
Read More
Secure Form to Secure Email Marketing Integration
November 11, 2020 • By Erik Kangas

Connect your Secure Forms to your Secure Marketing

From a marketing and engagement perspective, an extremely common and revenue-driving workflow is to have the contact information of the people who fill out your online forms automatically added to your marketing database. This integration saves time by not requiring manual data entry steps and...
Read More
Avoiding Ransomware
November 10, 2020 • By Erik Kangas

10 Tips for Preventing Ransomware Attacks

You’re already working long hours. Economic pressures are growing, and your team is running on empty. Now you need to mitigate yet another problem. Preventing ransomware attacks and mitigating their extreme financial impacts (an average of $8,500/hour of downtime) is essential. The following best practices can help your IT and healthcare...
Read More
Securing your iPhone Email
November 4, 2020 • By Erik Kangas

Securing your iPhone’s Email – Best Practices

Apple offers an array of configuration options for securing your iPhone email. However, there are a number of steps that you will have to take before your device and its emails are actually protected.   Securing your iPhone email: Protect the iPhone itself first The best place to start securing...
Read More
Business Associate Agreements
October 26, 2020 • By Erik Kangas

Business Associate Agreement: Explained

If your organization collects, stores or processes electronic protected health information (ePHI) it will need a clear understanding of business associate agreements (BAAs). This also applies to businesses that process ePHI on behalf of other organizations. Each business associate agreement stipulates how a company will share its ePHI with the...
Read More