January 10th, 2019

What You Need To Know About the HIPAA Security Rule

In this day and age of rampant cybercrime, protecting a patient’s electronic health information is of the utmost importance. But, how do you know if the protections are adequate? Well, that’s where the HIPAA Security Rule comes in. What is the difference between the privacy and security of health information? With respect to health information, […]

December 4th, 2018

Penetration Testing for HIPAA Compliance

Back in the day, the most important concern for a healthcare organization was to provide the best quality of life for its patients and to promote health awareness. However, in this day and age, healthcare organizations also need to worry about protecting patient information.  Some of this is identifiable and sensitive — PHI or Protected […]

November 27th, 2018

What is TLS? Secure Email 101

Transport Layer Security (TLS) is a widely used protocol in email security, the other being Secure Sockets Layer (SSL). Both are used to encrypt a communication channel between two computers over the internet. An email client uses the Transport Control Protocol (TCP) – which enables two hosts to establish a connection and exchange data – […]

November 20th, 2018

How to Know if an Email is a Phishing Scam or Not

Phishing scams are a major threat to all email users, especially businesses. The scary part is that they are becoming increasingly sophisticated. Phishing emails popped up sometime in the early 90s. However, back then, they weren’t too hard to detect. For instance, typos were commonplace in old-school phishing mail, which was a dead giveaway. Of […]

November 6th, 2018

Will Email Ever Be Truly Secure?

Email gateways are a leading cause of security breaches. The optimistic view is that effective email security practices, firewalls, mobile device security, wireless security, endpoint security, web security, behavioral best practices, data loss prevention and network access control – among other solutions – can ensure foolproof security. The realistic view is that email – or […]