Tag: iphone

Enhanced Security: AES-256 Encryption for SSL and TLS

December 1, 2020

SSL and TLS play critical roles in securing data transmission over the internet, and AES-256 is integral in their most secure configurations. The original standard was known as Secure Sockets Layer (SSL). Although it was replaced by Transport Layer Security (TLS), many in the industry still refer to TLS by its predecessor’s acronym. While TLS […]

Securing your iPhone’s Email – Best Practices

November 4, 2020

Apple offers an array of configuration options for securing your iPhone email. However, there are a number of steps that you will have to take before your device and its emails are actually protected.   Securing your iPhone email: Protect the iPhone itself first The best place to start securing your iPhone email is by […]

HIPAA Alert: Contacts, Calendar Events and Tasks may contain ePHI!

February 3, 2014

When health care organizations review their operations to see where electronic protected health information (ePHI) is being saved, transmitted, and viewed, a great deal of time is spent on the obvious candidates: email, chat, stored files, and health records, etc. Many overlook the fact that ePHI can be embedded in Contacts, Calendars, and Tasks.  Consider […]

HIPAA Compliant Calendars, Contacts and Reminders – Tasks for your iPhone and Android

April 3, 2013

While use of mobile devices and tablets in medical situations is pervasive; HIPAA compliant synchronization and storage of such information is often seriously lacking.  Everyone knows email can contain ePHI, but calendar appointments, address books, and task lists can and do contain just as much ePHI and their secure use must be strictly enforced. LuxSci’s WebAide collaboration […]

DuoSecurity: Advanced Two-Factor Login for LuxSci’s Web Interface

December 30, 2011

Two-Factor logins require users to Enter their username and password correctly (the 1st factor) Authenticate a second way (e.g., by entering a code delivered to their mobile phones). Using two-factor authentication ensures that even if a user’s password is discovered, guessed, or captured, a malicious user still cannot gain access to the user’s account … […]