" authentication Archives - Page 2 of 2 - LuxSci FYI Blog: Learn about HIPAA email encryption, secure email encryption, and more

Posts Tagged ‘authentication’

Protect your LuxSci Account with Two-Factor Authentication and Other Barriers

Thursday, May 23rd, 2013

Two-Factor Authentication (supposedly patented by Kim DotCom)– using a password plus “something else” to gain access to your account and to prevent lost, stolen, or guessed passwords from impacting you — is finally becoming fashionable.

First, it was a cool idea, then some places such as LuxSci started supporting it, but it was rarely used due to people not wanting to bother with an extra step to login to their accounts.  Now, with Twitter adding 2-factor authentication to help stem the tide of account compromises, security is now fashionable.

This turn about is really fantastic as it brings security consciousness much more into the mainstream — so much so that popular Radio hosts are talking on the air about how to secure accounts.  This can only be good for the adoption of better security practices overall and a decrease in compromises due to laziness … and in cases like HIPAA, laziness can be a terrible thing.

In this post, we’ll go over how to secure your LuxSci account against intrusion using Two Factor authentication and other methods.

Read the rest of this post »

How to send unlimited email to someone for free and without authentication or SSL

Friday, September 14th, 2012

We field questions daily from customers who need to configure some special software or piece of equipment to send them email, but can’t because their SMTP logins require authentication (e.g. a username and password), or their software/hardware cannot be configured to connect to specific SMTP ports, or maybe because their logins require SSL/TLS for transmission security but their device doesn’t support that (and isn’t sending anything sensitive anyway).

Of course, software can be updated; there are always newer or more expensive devices that have more robust email sending capabilities.  However, additional time and/or cost is rarely the ideal solution. If the program/device will not be sending sensitive data and the email stream does not require end-to-end protection (e.g. for HIPAA compliance), then there is a very easy work around to get the device to send your mail.

Read the rest of this post »

LUXSCI