Tag: access control

What exactly does HIPAA say about Email Security?

February 26, 2025

Performing daily business transactions and communications through electronic technologies is accepted, reliable, and necessary across the nation’s healthcare providers, payers and suppliers. As a result, email has become a standard in the healthcare industry as a way to conduct business activities that commonly include: Interacting with patients Real time authorizations for medical services Transcribing, accessing […]

4 Security Tips for Cybersecurity Awareness Month

October 26, 2022

October is Cybersecurity Awareness Month, and it’s worth taking a minute to reflect on your security stance and what you can do better to protect sensitive data and accounts. The Current State of Cybersecurity in 2022 Cybersecurity incidents and data breaches continue to increase across all industries. A 2022 report noted a 42% increase in […]

Improve Account Security by Enabling Multifactor Authentication

May 17, 2022

This month, the Cybersecurity and Infrastructure Security Agency (CISA) launched an initiative called MFA May to encourage individuals and businesses to enable multifactor authentication for their accounts. This article defines multifactor authentication and explains why organizations should implement it to improve the security of their accounts.   What is Multifactor Authentication? Multifactor authentication requires users […]

HIPAA Compliance for Mobile Apps

November 9, 2021

Many people rely on mobile devices to access the Internet, and apps are a convenient way to deliver online services. The health industry has also turned to mobile apps to provide health care services on the go. In some industries, developing apps may be relatively straightforward. However, those that deal with PHI need to understand […]

Zero Trust and Dedicated Servers

July 6, 2021

We will continue on in our series on Zero Trust, this time discussing Zero Trust and dedicated servers. As a quick recap, the Biden Administration ordered all federal agencies to develop a plan to adopt Zero Trust Architecture. This is a security model that begins with the assumption that even an organization’s own network may […]