Save Yourself From “Yourself”: Stop Spam From Your Own Address
I just got junk email … from me! It is surprisingly common for users to receive Spam email messages that appear to come from their own address (i.e. “joe@domain.com” gets a Spam email addressed so it appears to be from “joe@domain.com”). We discussed this issue tangentially in a previous posting: Bounce Back & BackScatter Spam […]
6 Telehealth Privacy and Security Essentials
HIPAA covers telehealth but does this make it safe? Learn the measures that ensure patient safety and privacy while using a virtual doctor visit program. Over the past few years, the rise of telehealth in healthcare has transformed patient-doctor interactions. Nonetheless, the privacy and security of protected health information (PHI) remain a big question. These […]
ARC and SMTP MTA-STS: The State of Domain-based Email Authentication – Part 3
We’ll close (for now) our three part series on the state of domain-based authentication for emails by completing the story on technologies being deployed or defined to improve the security of the email ecosystem. In Part 1, we wrote about using Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) to authenticate the sending mail […]
The HIPAA Breach Notification Rule: What it Really Means to Providers and Insurers
What exactly is ePHI? Who has to worry about it? Where can it be safely located?
There is often a great deal of confusion and misinformation about what constitutes ePHI (electronic protected health information) and how to protect it under HIPAA requirements. Even once you understand ePHI and how it applies to you, the next question becomes, where is ePHI permitted? What is secure and what is not? We will answer […]