LuxSci

LuxSci Establishes New Headquarters Offices in Cambridge, Mass.

LuxSci New Headquarters Offices

We’re thrilled to announce the opening of LuxSci’s new headquarters offices at Harvard Square in Cambridge, Massachusetts!

The move marks another milestone in our continuing journey to innovate and grow in secure healthcare communications. The new workspace aims to bring our people and teams together for in-person interactions and collaboration, and to better connect with our customers, partners and thought leaders. Located in the heart of one of the world’s most prestigious educational and technology hubs, our new office space reflects our roots and connections to the Massachusetts Institute of Technology (MIT), and our founder Erik Kangas, an MIT alumnus and advisor.

A Strategic Move for Continued Growth and Expansion

Opening our Cambridge office, part of the Industrious complex of offices, is not just about a change in location. The new office puts us at the center of cutting-edge technology in a thriving area for healthcare innovation. As a company deeply rooted in delivering the latest in secure, HIPAA-compliant communication solutions, this move allows us to leverage the rich talent pool and dynamic environment that Cambridge and the Greater Boston area have to offer.

Leading the Way in HIPAA Compliance for Healthcare Communications

At LuxSci, we’re proud to be the leader in HIPAA-compliant communication solutions for the healthcare industry, which includes serving some of the largest organizations in the US. With over two decades of experience, we understand the critical importance of safeguarding sensitive patient information and protected health information (PHI), but also how to increase patient and customer engagement.

The Next Step into Personalized Healthcare Engagement

Effective healthcare communication goes beyond just compliance—it’s about creating personalized and meaningful interactions with patients and customers. This often requires healthcare organizations to move beyond patient portals to open-up new communications channels and use cases, including email, marketing, text and forms—all in a HIPAA-compliant way. By protecting PHI data and using it in your communications for better personalization, you can deliver improved experiences and better outcomes for everyone involved.

Multi-Channel Suite of Secure Healthcare Communications Solutions

Today, LuxSci offers a suite of secure healthcare communication solutions, including support for high volume email, marketing, text messaging, and forms. As the demand for secure, compliant communication tools grows, LuxSci is at the forefront of delivering solutions that keep up with regulations and protect you from the latest threats.

“With our new Cambridge office, we’re launching the company into a new future with valuable connections to our past and where LuxSci was born,” said Mark Leonard, CEO of LuxSci. “Cambridge offers an unparalleled environment for innovation, and we’re excited to to bring our employees, partners and customers together – and to be part of this vibrant community.”

Want to see for yourself?

Contact us today for an in-person visit to talk about the future of secure healthcare
communications. 

Picture of LuxSci

LuxSci

Get in touch

Find The Best Solution For Your Organization

Talk To An Expert & Get A Quote




A member of our staff will reach out to you

Get Your Free E-Book!

LuxSci High Email Deliverability Best Practices Paper

What you’ll learn:

Related Posts

LuxSci G2 2026

LuxSci Earns 19 G2 Spring 2026 Badges

LuxSci continues its strong performance in the G2 Spring 2026 Reports, earning 19 badges that reflect real customer satisfaction and consistent product excellence across multiple areas, including email encryption, HIPAA compliant messaging, email security and email gateways.

G2: A Highly Reputable Peer Review Platformn

In a crowded software landscape, it’s easy for bold claims to blur together. That’s where G2 stands apart. Its rankings are based entirely on verified user feedback, giving buyers a clearer picture of how solutions actually perform in day-to-day use, not just how they’re marketed.

For Spring 2026, LuxSci earned recognition across multiple categories, including Leader, Best Customer Support, and Best ROI. Together, these awards show that LuxSci delivers leading technology and a best-in-class customer experience.

What the Badges Represent

Each G2 badge reflects direct input from customers using LuxSci in real-world environments. These evaluations cover usability, onboarding, support responsiveness, and long-term value. LuxSci’s Spring 2026 badges span leadership, customer satisfaction, ROI, and ease of implementation, demonstrating consistent strength across the full customer lifecycle.

Leader Badge: Market Leadership Validated

The Leader badge is awarded to companies with high customer satisfaction and strong market presence. LuxSci’s placement reflects reliable performance, strong security, and continued trust from organizations operating in highly regulated environments like healthcare.

Best Customer Support: A Standout Strength

In secure healthcare communications, timely and accurate support is essential. Issues must be resolved quickly to avoid operational or compliance risks. Customers consistently highlight LuxSci’s fast response times, deep expertise, and a hands-on approach, showing that our technology and our people deliver meaningful, real-world solutions.

Best ROI: Proven Business Value

ROI includes reduced compliance risk, improved efficiency, and scalable operations, not just cost. Customers report measurable benefits from LuxSci’s reliability, built-in compliance, and streamlined workflows, leading to strong long-term value and a solution that keeps you ahead of security and compliance risks.

What This Means for LuxSci Customers

These awards show LuxSci’s ability to serve organizations of varying sizes, from mid-market to enterprise. All reviews are from verified users, ensuring authenticity and transparency. Customers consistently mention reliability, security, and responsive support, along with overall peace of mind. The recognitions validate LuxSci’s ability to deliver secure, dependable communication solutions backed by strong support, including HIPAA compliant email, marketing and forms.

LuxSci’s 10 G2 Spring 2026 badges—including Leader, Best Customer Support, and Best ROI—demonstrate consistent excellence across performance, usability, and customer satisfaction. These results reinforce its position as a trusted provider in secure communications.

LuxSci MFA

Traditional MFA No Longer Qualifies as “Reasonable” Security

For years, multi-factor authentication (MFA) was considered one of the most effective ways to protect sensitive systems. By requiring a second verification step, such as a text message code or push notification, organizations could significantly reduce the risk of compromised passwords.

But the threat landscape has changed.

Today, attackers routinely bypass traditional MFA using techniques such as MFA evasion, token replay attacks, and consent phishing. These methods are no longer rare or highly sophisticated. They are widely used, automated, and increasingly effective.

As a result, regulators, auditors, and security frameworks are raising expectations for authentication security. For healthcare organizations in particular, traditional MFA alone may no longer satisfy the HIPAA requirement to implement “reasonable and appropriate safeguards.”

In the near future, email systems that rely only on basic MFA, without conditional access or phishing-resistant authentication, may increasingly be viewed as security gaps during risk assessments.

Why Traditional MFA Is No Longer Enough

Traditional MFA still improves security compared to passwords alone. However, many common MFA methods were designed before today’s phishing techniques and cloud authentication attacks became widespread.

Common MFA methods include:

  • SMS verification codes
  • Email-based authentication codes
  • Push notifications to mobile apps

While these mechanisms add friction for attackers, they can still be intercepted or manipulated during sophisticated phishing attacks. Because modern attackers now target authentication workflows directly, organizations relying solely on traditional MFA may be more vulnerable than they realize.

How Attackers Bypass MFA Today

Cybercriminals increasingly rely on tools that capture credentials and authentication tokens during login sessions. Three attack techniques are now especially common.

  • MFA Evasion and Phishing Proxies – Attackers frequently deploy adversary-in-the-middle phishing kits that sit between the user and the real login service. When users enter their credentials and MFA code on a phishing page, the attacker forwards the information to the legitimate site and captures the authentication session. The user successfully logs in—but the attacker gains access as well. If attackers capture those tokens, they can reuse them to access the account directly.
  • Token Replay Attacks – After successful authentication, systems typically issue session tokens that allow users to remain logged in without repeated MFA prompts. This technique has been widely observed in attacks targeting cloud email platforms such as Microsoft 365, allowing attackers to access email data even when MFA is enabled.
  • Consent Phishing – Consent phishing bypasses MFA entirely. Instead of stealing passwords, attackers trick users into granting permissions to malicious applications that request access to their mailbox or files. If users approve the request, the attacker’s application receives persistent access to the account through APIs—often without triggering security alerts.

Why Email Authentication Matters Most in Healthcare

Email remains one of the most critical systems in healthcare organizations. It supports patient communication, internal collaboration, and the exchange of sensitive information. Unfortunately, it is also the most frequently targeted entry point for cyberattacks.

Once attackers gain access to an email account, they can:

  • Impersonate healthcare staff
  • Launch internal phishing attacks
  • Access sensitive patient communications
  • Extract protected health information (PHI)

Because of this, email authentication controls are becoming a major focus for security teams and compliance auditors alike.

Evolving Regulatory Expectations

HIPAA does not prescribe specific technologies, but it requires organizations to implement safeguards that are “reasonable and appropriate” based on risk. As new attack methods emerge, the definition of reasonable security evolves.

Today, many security frameworks and regulatory bodies are emphasizing stronger identity protections, including:

  • Phishing-resistant authentication
  • Conditional access policies
  • Monitoring for suspicious login behavior
  • Controls for third-party application permissions

Organizations that rely solely on basic MFA may increasingly struggle to demonstrate that their authentication protections are sufficient.

The Shift Toward Phishing-Resistant Authentication

To address the weaknesses of traditional MFA, many organizations are adopting phishing-resistant authentication technologies, which can be enabled with tools like Duo and Okta. These solutions rely on cryptographic authentication tied to trusted devices, which prevents attackers from capturing or replaying login credentials.

Examples include:

  • Hardware security keys
  • Passkeys
  • Certificate-based authentication

Because authentication is tied to both the device and the legitimate website domain, these technologies significantly reduce the success rate of phishing attacks.

Why Conditional Access Is Becoming Essential

Conditional access adds another layer of protection by evaluating context and risk before granting access. Instead of treating every login the same, conditional access policies analyze signals such as:

  • Device security status
  • Geographic location
  • Network reputation
  • User behavior patterns

If something appears unusual, such as a login from a new country, the system can require stronger authentication or block the attempt altogether. This risk-based approach to authentication helps prevent many account compromise scenarios.

The Future of HIPAA Risk Assessments

As authentication threats evolve, healthcare security assessments are increasingly focusing on identity protection maturity. Organizations may begin seeing findings related to:

  • Weak or outdated MFA methods
  • Lack of conditional access policies
  • Insufficient monitoring of login activity
  • Unrestricted third-party application permissions

In particular, email systems without advanced authentication protections may be flagged as high-risk vulnerabilities, especially when PHI is accessible.

LuxSci’s Modern Approach to MFA

Modern threats require more than a simple second login factor. LuxSci approaches authentication security with layered identity protection designed specifically for healthcare environments.

Instead of relying solely on basic MFA methods like SMS codes or email verification, LuxSci supports stronger authentication controls and policies that align with evolving security expectations. These protections can include:

  • Strong multi-factor authentication options
  • Monitoring for unusual login behavior
  • Enhanced identity verification mechanisms

By combining multiple security layers within its HIPAA-compliant secure communications email and marketing solutions, LuxSci helps healthcare organizations protect sensitive email communications while maintaining usability for providers, health plan administrators, payment providers, and patient engagement teams.

Conclusion

Multi-factor authentication remains an important security control—but not all MFA is created equal. Attack techniques such as phishing proxies, token replay, and consent phishing have demonstrated that traditional MFA methods can be bypassed. As a result, regulators and auditors are increasingly expecting stronger identity protections.

For healthcare organizations that rely heavily on email communications, the implications are significant. Weak authentication controls can expose sensitive patient data and may soon appear as high-risk findings during HIPAA risk assessments. The organizations best positioned for the future will be those that modernize authentication strategies now, moving toward phishing-resistant methods, conditional access policies, and layered identity protection.

Reach out to LuxSci today to learn how HIPAA compliant email can support both your organization’s engagement and cybersecurity needs.


FAQs

1. What is traditional MFA?

Traditional MFA refers to authentication methods that require a second verification step, typically SMS codes, email codes, or push notifications.

2. Why can attackers bypass MFA today?

Modern phishing tools can intercept authentication sessions or steal login tokens, allowing attackers to access accounts even when MFA is enabled.

3. What is phishing-resistant authentication?

Phishing-resistant authentication uses cryptographic methods tied to trusted devices, preventing attackers from capturing login credentials.

4. Why is email security especially important for healthcare organizations?

Email systems often contain patient communications and sensitive information, making them a common target for cyberattacks.

5. How can organizations improve authentication security?

Organizations can strengthen identity security by adopting phishing-resistant authentication methods, implementing conditional access policies, and monitoring login activity.

LuxSci Automated Email Encryption

Encryption Optional Email Will Fail Audits in 2026 and Beyond

For years, healthcare organizations have relied on click-to-encrypt email workflows and secure portals as a practical compromise between usability and compliance. Or in some cases, they simply thought most of their emails did not need to be compliant. In regulated industries where data security and privacy are paramount, this approach was still considered “good enough.”

That era is ending.

As we progress into 2026 and beyond, regulators, auditors, and cyber insurers are sending a clear and consistent message: encryption that depends on human choice is no longer acceptable. It’s already happening. Encryption optional email isn’t merely raising concerns, it’s failing audits outright.

An Email Threat Landscape That’s Changing Faster Than Email Habits

Historically, email encryption was treated as a best practice rather than a hard requirement. If an organization could demonstrate that encryption tools existed and that employees had access to them, auditors were often satisfied. The box was checked, everybody moved on.

Today, the questions auditors ask are fundamentally different. Instead of asking whether encryption is available, they are asking whether sensitive data can ever leave the organization unencrypted. If the answer is yes, even in rare cases, or even accidentally, that’s no longer viewed as an acceptable gap. It’s viewed as inadequate control.

Why 2026 Is a Tipping Point for Email Security

Several forces are converging here in 2026 that make optional encryption increasingly untenable. Regulatory scrutiny around PHI and PII exposure continues to intensify. Breach costs and litigation are rising, with email remaining one of the most common vectors for data exposure and breaches. AI is also changing the game for cybercriminals, and attacks will continue to increase and be more sophisticated. As a result, cyber insurers are tightening underwriting requirements and demanding stronger, more predictable controls.

At the same time, email user behavior is unpredictable and inconsistent, which is a non-starter for data security in today’s world.

Taken together, these trends and behaviors point to a single requirement: email security controls must be automated. They must be enforced by systems, not dependent on employee memory, judgment, or good intentions.

The Reality of “Encryption Optional” in Practice

On paper, optional encryption can sound reasonable. In practice, it creates gaps large enough to open you up to a breach.

Secure portals are a good example. They require recipients to click a link, authenticate, and access content in a controlled environment. While this protects data in transit, and is a better approach than no security at all, it also introduces friction. And people don’t like friction. Senders forget to use the portal. Recipients ask for “just a quick email instead.” Shortcuts are taken to save time. And every shortcut becomes a risk.

Click-to-encrypt systems suffer from a similar problem. They rely on users to correctly identify sensitive data and remember to take action. But people often misclassify information, forget to click the button, or assume someone else has already secured the message. From an auditor’s perspective, this isn’t a training failure. It’s a set-up and control failure.

Email Security Defaults Are the New Normal

The latest message from regulators, auditors, and insurers is clear. If encryption is optional, data vulnerabilities become inevitable.

What can you do?

Below is a quick email security checklist to help you get started. Cyber insurers may require or recommend the following safeguards during the underwriting process, such as:

  • Multi-factor authentication (MFA)
  • Endpoint protection
  • Encrypted backups
  • Incident response planning
  • Encryption protocols for sensitive data in transit and at rest, including PHI in emails

In 2026 and beyond, healthcare organizations and regulated industries will be judged not by what they allow, but by what they prevent. Automated, encrypted email is the new. normal.

Want to learn more about LuxSci HIPAA compliant email? Reach out today.

LuxSci Oiva Health

LuxSci and Oiva Health Combine to Form Transatlantic Healthcare Communications Group

Boston & Helsinki, February 12, 2026 – LuxSci, a provider of secure healthcare communications solutions in the United States, and Oiva Health, a Nordic provider of Digital Care solutions in social and healthcare services, today announced that the companies are joining forces. Backed by Main Capital Partners (“Main”), the combination brings together two complementary platforms and teams, forming a strong transatlantic software group focused on secure healthcare communications.

Founded in 1999, LuxSci is a U.S. provider of HIPAA‑compliant, secure email, marketing, and forms solutions. Its application and infrastructure software enable organizations to securely deliver personalized, sensitive data at scale to support a broad range of healthcare communications and workflows including care coordination, benefits and payments, marketing, wellness communications, after care and ongoing care. Certified by HITRUST for the highest levels of data security, LuxSci serves dozens of healthcare enterprises and hundreds of mid‑market organizations.

Founded in 2010, Oiva Health is a provider of digital care and communications solutions in the Nordics. Headquartered in Finland, with additional offices in Denmark, Norway, and Sweden, Oiva Health offers digital care and digital clinic solutions – including digital visits, secure messaging, online scheduling and appointments, and caregiver communications – serving the long-term care, especially elderly care, and occupational healthcare verticals. The company employs approximately 60 people and has recently expanded across the Nordic region, with a growing presence in Norway and Sweden.

The combination of LuxSci and Oiva Health creates a larger, cross Atlantic group with complementary solutions, serving the U.S. and European markets. Together, the companies offer healthcare providers, payers, and suppliers a comprehensive suite of tools to communicate securely and compliantly, spanning communications, workflows, and virtual care delivery.

Daan Visscher, Partner and Co-Head North America at Main, commented: “We are pleased to announce this cross Atlantic transaction, creating an internationally active secure communications player within the healthcare and home care space. The combined product suite enables healthcare organizations to drive much needed efficiency gains in healthcare provision addressing a global trend of rising costs, aging population, and increasing pressure on resources needed to provide high-quality care.”

Mark Leonard, CEO of LuxSci, said, “We are thrilled to join forces with Oiva Health and believe that together we can truly make a difference in healthcare coordination, access, and delivery. We see an exciting path forward with our customers benefiting from an end-to-end, secure and compliant approach to optimizing both healthcare communications and today’s frontline workers, which we need now more than ever.”

Juhana Ojala, CEO at Oiva Health, concluded, “We look forward to this new chapter together with LuxSci. We are very excited about the strong alignment between our solutions, which especially strongly positions us to expand our flagship Digital Care offering to the high-potential U.S. care market – from care coordination to care delivery to in-home and institutional care.”

Nothing contained in this Press Release is intended to project, predict, guarantee, or forecast the future performance of any investment. This Press Release is for information purposes only and is not investment advice or an offer to buy or sell any securities or to invest in any funds or other investment vehicles managed by Main Capital Partners or any other person.

[END OF MESSAGE]

About LuxSci

LuxSci is a U.S.-based provider of secure healthcare communications solutions for the healthcare industry. The company offers secure email, marketing, forms and hosting, delivering HIPAA‑compliant communication solutions that enable organizations to safely manage and transmit sensitive data. Founded in 1999, LuxSci serves more than 1,900 customers across healthcare verticals, including providers, payers, suppliers, and healthcare retail, home care providers, and healthcare systems, as well as organizations operating in other highly regulated industries. LuxSci is HITRUST‑certified with example clients being Athenahealth, 1800 Contacts, Lucerna Health, Eurofins, and Rotech Healthcare, among others.

About Oiva Health

Oiva Health is a Digital Care provider in the Nordics, offering a comprehensive Digital Platform for integrated health and care services to digitalize primary healthcare, social care, hospital healthcare and long-term care services. The company was founded in 2010 and currently employs approximately 60 people in Finland, Denmark, Norway, and Sweden serving domestic municipalities, customers and partners, such as City of Helsinki, Keski-Suomi Welfare Region, Länsi-Uusimaa Welfare Region in Finland, and Viborg municipality in Denmark with its Digital Care platform. Annually over 5 million customer contacts are handled digitally through Oiva Health’s Digital Care and Digital Clinic platforms.  

About Main Capital Partners

Main Capital Partners is a software investor managing private equity funds active in the Benelux, DACH, the Nordics, France, and the United States with approximately EUR 7 billion in assets under management. Main has over 20 years of experience in strengthening software companies and works closely with the management teams across its portfolio as a strategic partner to achieve profitable growth and create larger outstanding software groups. Main has approximately 95 employees operating out of its offices in The Hague, Düsseldorf, Stockholm, Antwerp, Paris, and an affiliate office in Boston. Main maintains an active portfolio of over 50 software companies. The underlying portfolio employs approximately 15,000 employees. Through its Main Social Institute, Main supports students with grants and scholarships to study IT and Computer Science at Technical Universities and Universities of Applied Sciences.

The sender of this press release is Main Capital Partners.

For more information, please contact:

Main Capital Partners
Sophia Hengelbrok (PR & Communications Specialist)

sophia.hengelbrok@main.nl

+ 31 6 53 70 76 86

You Might Also Like

HIPAA Email Policy

What Should a HIPAA Email Policy Include?

A HIPAA email policy should include procedures for PHI handling, encryption requirements, user access controls, patient authorization processes, breach response protocols, and staff training requirements. The policy must define acceptable email usage, specify security measures for different types of communications, establish audit procedures, and outline consequences for violations to ensure comprehensive compliance with HIPAA Privacy and Security Rules. Healthcare organizations often develop email policies reactively after compliance issues arise rather than proactively addressing HIPAA requirements. HIIPAA email policy development helps prevent violations while enabling efficient email communications that support patient care and organizational operations.

Scope and Applicability Definitions

Policy coverage must clearly define which email activities fall under HIPAA requirements and which personnel must follow established procedures. HIPAA email policy should address both internal communications between staff members and external communications with patients, providers, and business partners. PHI identification guidelines help staff recognize when email messages contain protected health information that requires additional security measures. These guidelines should include examples of obvious PHI like patient names and medical record numbers as well as less obvious information that could identify patients. Exception procedures provide guidance for emergency situations when standard email security measures might delay urgent patient care communications. These procedures should balance patient safety needs with privacy protections while documenting when and why exceptions occur.

User Authentication and Access Control Procedures

Password requirements must specify minimum standards for email account security including length, complexity, and change frequency. The policy should address both initial password creation and ongoing password management to maintain account security over time. Account management procedures define how email access is granted, modified, and terminated based on employment status and job responsibilities. The policy should specify who has authority to approve access changes and how quickly modifications must be implemented. Remote access guidelines establish security requirements for accessing organizational email systems from outside locations or personal devices. These guidelines should address virtual private network usage, device security standards, and restrictions on PHI access from unsecured networks.

Email Content and Communication Standards

PHI usage guidelines specify when patient information can be included in email communications and what security measures apply to different types of content. The policy should distinguish between internal communications among healthcare team members and external communications with patients or other organizations. Subject line restrictions help prevent inadvertent PHI disclosure through email headers that might be visible to unauthorized recipients or stored in unsecured log files. Staff should understand how to reference patients and medical conditions without revealing specific identifying information. Attachment handling procedures define security requirements for medical records, test results, and other documents transmitted via email. HIPAA email policy should specify encryption standards, file naming conventions, and restrictions on certain types of sensitive information.

Encryption and Security Implementation Requirements

Encryption standards must specify which types of email communications require encryption and what methods meet organizational security requirements. The policy should address both automatic encryption for all emails and selective encryption based on content sensitivity. External communication requirements define additional security measures for emails sent outside the healthcare organization to patients, referring providers, or business partners. These requirements might include patient portal usage, secure email gateways, or alternative communication methods for highly sensitive information. Mobile device security addresses special considerations for accessing email from smartphones and tablets used for patient care activities. The policy should specify device encryption requirements, application restrictions, and procedures for lost or stolen devices.

Patient Authorization and Consent Management

Consent documentation procedures define when patient authorization is required for email communications and how these authorizations should be obtained and recorded. The policy should distinguish between treatment communications that do not require authorization and marketing or administrative communications that do. Authorization tracking systems help staff verify patient consent status before sending emails that require authorization. HIPAA email policy should specify how consent information is maintained and accessed while protecting patient privacy and supporting audit requirements. Revocation procedures establish how patients can withdraw consent for email communications and how these changes are implemented across organizational systems. Staff should understand how to process revocation requests promptly while maintaining records of authorization changes.

Incident Response and Breach Management Protocols

Violation reporting procedures define how staff should report potential HIPAA violations or security incidents involving email communications. The policy should specify who receives reports, what information must be included, and timeframes for reporting different types of incidents. Investigation processes outline how the organization will assess potential violations to determine whether they constitute HIPAA breaches requiring patient notification or regulatory reporting. These processes should include roles and responsibilities for investigation team members. Corrective action procedures establish how the organization will address confirmed violations and prevent similar incidents in the future. HIPAA email policy should include disciplinary measures for staff violations and system improvements for prevention measures.

Training and Compliance Monitoring Elements

Initial training requirements specify what HIPAA email education all staff must receive before gaining access to organizational email systems. The policy should define training content, delivery methods, and documentation requirements for compliance tracking. Refresher training schedules ensure that staff receive updated information about email security requirements and organizational policy changes. The policy should specify training frequency and procedures for tracking completion across different employee groups. Audit procedures define how the organization will monitor email usage to identify potential violations and assess policy effectiveness. The policy should specify audit frequency, scope, and reporting requirements while protecting legitimate email privacy expectations for non-PHI communications.

Sending HIPAA Compliant Email

Sending HIPAA Compliant Email the Right Way

Maintaining HIPAA compliance is a critical requirement for healthcare providers, payers and suppliers dealing with protected health information (PHI). Ensuring your email communications align with those standards can be, well… tricky. With fines reaching into the millions, non-compliance isn’t something you want to risk. We’ve seen it time and time again when engaging with our customers and prospects. Unfortunately, many organizations fall into the trap of believing they’re sending HIPAA compliant emails because they’ve applied what we call “self-certification” strategies—without fully understanding what’s required to be compliant.

Are you 100% sure that you’re sending HIPAA compliant emails?

In this blog post, we’ll delve into the risks of being non-compliant, explain why self-certification strategies often lead to problems, and provide a HIPAA-compliant email checklist to help ensure your organization avoids the pitfalls self-compliance.

The Importance of Sending HIPAA Compliant Emails

HIPAA (Health Insurance Portability and Accountability Act) was established to ensure the protection and privacy of patients’ PHI. This law mandates that any entity handling PHI must implement strict safeguards to prevent unauthorized access, breaches, and exposure of sensitive patient data.

In today’s digital world, where healthcare communications often take place over email and other digital platforms, maintaining HIPAA compliance becomes even more complex. It’s not enough to merely think you’re compliant; you must be able to prove it beyond a doubt.

What Is PHI and Why Does It Need to Be Protected?

As a quick reminder, PHI refers to any data that can be used to identify an individual and that relates to their past, present, or future health condition. This can include anything from personal identification information to medical records and billing information to email exchanges that reference patient care.

Examples of PHI include:

  • Names
  • Addresses
  • Birth dates
  • Social Security numbers
  • Medical history and diagnoses
  • Treatment plans & prescriptions
  • Medical device usage and services
  • Appointment information
  • Billing, payments and insurance information

The Risks of Not Being 100% Sure About HIPAA Compliance

In addition to losing sleep at night, the consequences of sending non-compliant emails can be significant. Non-compliance can result in hefty penalties, ranging from $100 to $50,000 per violation, depending on the severity and intent. In some cases, these fines can even surpass $1.5 million annually.

But it’s not just the fines—PHI exposure opens the door to a variety of serious risks, including the reputational damage that can stem from breaches of patient data that can impact peoples’ lives and the future of your business. Patients place immense trust in healthcare providers and organizations to safeguard their sensitive information, which stretches beyond HIPAA-compliance to overall data security and privacy. The loss of patient trust is difficult—if not impossible—to regain once compromised.

Sending HIPAA Compliant Email

The Problem with DIY HIPAA Compliance

Simply put, self-certifying HIPAA compliance is a recipe for disaster. Many companies and healthcare organizations falsely believe that if they conduct an internal review or have implemented basic security measures, they’re fully compliant. But without the right expertise and the right technology in place, especially encryption, it’s easy to overlook crucial details.

Even if you have encryption in place or think your emails are safe, these minimal steps can create a false sense of security. True HIPAA compliance requires continuous monitoring, updating of policies, and regular training to address potential risks.

A Checklist for Sending HIPAA Compliant Email

Sending HIPAA compliant email means ensuring you’ve implemented the following safeguards:

1. Encryption Standards for HIPAA Compliance

All emails containing PHI must be encrypted both at rest and in transit—end-to-end. Ensure your email service provider offers high-grade encryption protocols, like TLS (Transport Layer Security), for sending and receiving messages, and flexible options, including dedicated cloud infrastuctures for the highest levels of data protection.

2. Secure Access and Authentication

Set up multi-factor authentication (MFA) and role-based access controls to limit who can access emails containing PHI.

3. Business Associate Agreements (BAA)

If you’re using a third-party email provider, you must have a signed BAA. This agreement ensures that the provider will uphold HIPAA’s security standards.

4. Data Backup and Recovery

Make sure your email system has a secure backup and recovery solution. Data breaches can happen, but having a recovery plan will minimize damage and maintain compliance.

5. Employee Training and Awareness

Ensure your employees are regularly trained on HIPAA guidelines. Human error is one of the leading causes of HIPAA violations, so proper education is key.

6. Regularly Audit Your HIPAA Compliance Strategy & Practices

HIPAA regulations evolve as technology advances. Conducting regular compliance audits ensures your security protocols are up to date with the latest best practices.

7. Avoiding Overconfidence in Your Own Processes

No matter how confident you are in your HIPAA strategy, bringing in an external auditor can provide an unbiased view of your compliance status and help identify overlooked vulnerabilities.

Don’t Let HIPAA Self-Certification Fool You!

HIPAA compliance is not something you can afford to be unsure about. The risks—both financially and reputationally—are too great. While it may be tempting to “self-certify” or assume your current measures are sufficient, doing so can leave your organization—and your patients and customers—vulnerable. Instead, ensure that you follow a comprehensive strategy that includes best-in-class email encryption, secure access, regular audits, employee training, and support from external experts.

Don’t take shortcuts when it comes to protecting sensitive health information and ensuring HIPAA compliance—get it right from the start.

If you’d like to get your questions on sending HIPAA compliant email answered, don’t hesitate to reach out to talk with one of our experts—and learn more about the healthcare industry’s leading HIPAA-compliant email, text and marketing solutions from LuxSci.

Contact us here!

Is SendGrid HIPAA compliant?

Is SendGrid HIPAA-Compliant?

Twilio’s SendGrid is a cloud-based email marketing platform that contains the tools and resources that organizations need to carry out bulk email marketing campaigns. By providing companies with a robust, scalable email infrastructure, SendGrid reduces the technical and management overhead from delivering emails at scale.

SendGrid’s capabilities and benefits are undeniable – and are the reason why the popular platform is the email delivery service of choice for prominent companies like Spotify and Airbnb. For healthcare organizations, however, while reliability and scalability are essential for large-scale patient engagement campaigns and communications, security is another crucial concern. More specifically, for a healthcare company to send electronic protected health information (ePHI) through an email services platform, the service must be HIPAA-compliant.

This then begs the question, is SendGrid a HIPAA compliant email service? Subsequently, can companies use SendGrid to transmit ePHI?

The short answer is no, they are not. Let’s take a closer look

Is SendGrid HIPAA-Compliant?

SendGrid is not a HIPAA-compliant email service.  There are two key reasons for this:

  1. It lacks sufficient encryption measures
  2. SendGrid does not sign business associate agreements (BAAs)

Let’s discuss each reason in greater detail.

Basic Encryption

SendGrid only offers the basic encryption provided by the Simple Mail Transmission Protocol (SMTP), i.e., the standard mechanism used to transmit emails.

Unfortunately, this level of encryption leaves ePHI vulnerable to cyber threats such as business email compromise (BEC) attacks, ransomware, and device loss or theft. In contrast, for an email services platform to be HIPPA-compliant, it must protect ePHI in transit and at rest, using security measures like Transport Layer Security (TLS) encryption and end-to-end encryption.

Refreshingly, SendGrid is clear and upfront about this (in contrast to, Mailchimp, for example, who make you dig a little deeper to determine their non-compliance) – as Twilio’s documentation explicitly says that they do not offer HIPAA-compliant data transmission. Stating, “SendGrid does not natively support HIPAA-compliant data transmission. We do not offer any encryption or security measures surrounding message transmission beyond those included in the SMTP RFC, which was not designed with HIPAA compliancy in mind.”

In short, SendGrid wasn’t designed to withstand the increased cyber risk that accompanies handling ePHI and isn’t HIPPA-compliant as a result.

No Business Associate Agreement

Additionally, in addition to lower levels of encryption, SendGrid does not sign the business associate agreements (BAA) required to be HIPPA-compliant.

A business associate agreement (BAA) is a written contract between a covered entity (your company) and a business associate (a service provider, such as an email services or email marketing platform) that’s an essential requirement of HIPAA compliance. A BAA details how two organizations can share data and the legal responsibilities of each party.

This is again stated on Twilio’s website that says, “Twilio SendGrid does not intend uses of the Service to create obligations under The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), the Gramm-Leach-Bliley Act (“GLBA”) or similar laws and makes no representations that the Service satisfies the requirements of such laws. If You are (or become) a Covered Entity or Business Associate (as defined in HIPAA) or a Financial Institution (as defined in GLBA), You agree not to use the Service for any purpose or in any manner involving Protected Health Information (as defined in HIPAA) or Nonpublic Personal Information (as defined in GLBA).”

Here, Twilio is explicitly telling you that SendGrid does not fit the requirements of HIPPA-compliant and that you should not use their service to transmit ePHI.

HIPAA-Compliant Alternatives to SendGrid

While healthcare companies cannot rely on popular options like SendGrid if they want to utilize ePHI in their patient outreach campaigns, fortunately, there are HIPAA-compliant email platforms that are specifically designed for organizations that have to comply with the regulations.

As the most experienced HIPAA-compliant email provider, LuxSci specializes in providing secure and scalable HIPAA-compliant services for companies aiming to send hundreds of thousands – or millions – of emails. In light of this, we place security, regulatory and practical considerations front and center when building our solutions – from their early planning stages until final deployment.

Our approach results in tailor-made tools and services like HIPAA-compliant bulk email, secure text and secure marketing. This includes flexible encryption functionality, such as TLS, end-to-end, or role-based access encryption, that enable healthcare organizations to align their security with the sensitivity of the transmitted and their specific business requirements – all while remaining HIPAA compliant.

To discover how LuxSci and SendGrid stack up against each other, as well as with other HIPAA-compliant, general purpose and marketing email providers on the market, including Virtru and Mailchimp, take a look at our Vendor Comparison Guide.  The guide takes a deep dive on 12 email delivery platforms, offering insights on what to consider when selecting a provider – and how to choose the vender best suited to meet your secure healthcare communications needs.

Get your copy here, and reach out to us with any questions.

Best Secure Email Hosting

Healthcare Email Threat Readiness Strategies

Are you up to date on the latest email security threats?

In this post, we share details from our just-released Email Cyber Threat Readiness Report, exploring the most effective ways to strengthen your healthcare organization’s email cyber threat readiness in 2025.

Let’s go!

Conduct Regular Risk Assessments 

To strengthen your company’s email security posture, you must first identify vulnerabilities in your infrastructure that malicious actors could exploit. Frequent risk assessments will highlight the security gaps in your email infrastructure and allow you to implement the appropriate strategies to mitigate threats.

A comprehensive email risk assessment should include:

  • Assessment of email encryption practices.
  • Review of email authentication protocols, i.e., SPF, DKIM, DMARC.
  • Evaluation of access control policies and practices.
  • Assessment of malware detection capabilities.
  • Audit of third-party integrations.
  • Testing of employee email threat awareness through simulated attacks to determine threat readiness and training needs.
  • Review of incident response and business continuity plans, especially, in this case, in regard to email-based threats.

A risk assessment may also involve the use of vulnerability scanning tools, which scan your email infrastructure looking for conditions that match those stored in a database of known security flaws, or Common Vulnerabilities and Exposures (CVEs). Alternatively, healthcare companies often employ the services of ethical, or ‘white hat’, hackers who carry out penetration tests, in which they purposely attempt to breach your email security measures to pinpoint its flaws.

​​Implement Email Authentication Protocols

As touched on above, enabling and correctly configuring the right email authentication protocols is an essential mitigation measure against phishing and BEC attacks, domain spoofing and impersonation, and other increasingly common email threats. Just as importantly, it allows recipient email servers to verify that a message is authentic and originated from your servers, which reduces the risk of your domain being blacklisted and your emails being directed to spam folders instead of the intended recipient’s inbox.

The three main email authentication protocols are:

  • DomainKeys Identified Mail (DKIM): adds a cryptographic signature to outgoing emails, allowing the recipient’s server to verify that the email was not altered in transit. 
  • Sender Policy Framework (SPF): allows domain owners to specify which servers are authorized to send emails on their behalf, mitigating domain spoofing and other forms of impersonation.
  • Domain-based Message Authentication, Reporting & Conformance (DMARC): builds on SPF and DKIM by establishing policies for handling unauthorized emails. It instructs the recipient email server to monitor, quarantine, or reject emails that fail authentication checks. 

Establish Robust Access Control Policies

Implementing comprehensive access control policies reduces the chances of ePHI exposure by restricting its access to individuals authorized to handle it. Additionally, access privileges shouldn’t be equal and should be granted based on the employee’s job requirements, i.e., role-based access control (RBAC).

Zero Trust Architecture (ZTA), in contrast, is a rapidly emerging, and more secure, alternative to RBAC. ZTA’s core principles are “least privilege”, i.e., only granting the minimum necessary access rights, and “never trust, always verify”, i.e., continually asking for the user to confirm their identity as the conditions of their session change, e.g., their location, the resources they request access to, etc. 

Enable User Authentication Measures

Because a user’s login credentials can be compromised, through a phishing attack or session hijacking, for instance, access control, though vital, only protects ePHI to an extent. Subsequently, you must require a user to prove their identity, through a variety of authentication measures – with a common method being multi-factor authentication (MFA).

Recommended by HIPAA, MFA requires users to verify their identity in two or more ways, which could include:

  • Something they know (e.g., one-time password (OTP), security questions)
  • Something they have (e.g., a keycard or security token)
  • Something they are (i.e., biometrics: retinal scans, fingerprints, etc.). 

What’s more, it’s important to note that the need to enable MFA will be emphasized to a greater degree when the proposed changes to the HIPAA Security Rule go into effect in late 2025.

Identify and Manage Supply Chain Risk

While on the subject of access control, one of the most significant security concerns faced by healthcare organizations is that several third-party organizations, such as vendors and supply chain partners, have access to the patient data under their care to various degrees. As a result, cybercriminals don’t have to breach your email security measures to access ePHI – they could get their hands on your patients’ data through your vendors.

Consequently, third-party risk management must be a fundamental part of every healthcare organization‘s email threat mitigation strategy.  This requires you to ensure that each vendor you work with has strong email security measures in place. In light of this, a HIPAA requirement is to have a business associate agreement (BAA) in place with each third party, or business associate, so you both formally establish your responsibilities in securing ePHI. 

Set Up Encryption for Data In Transit and At Rest

Encrypting the patient data contained in email communication is a HIPAA regulation, as it prevents its exposure in the event of its interception by a cybercriminal. You should encrypt ePHI both in transit, i.e., when being included in emails, and at rest, i.e., when stored in a database.

Encryption standards sufficient for HIPAA compliance include:

  • TLS (1.2 +): a commonly-used encryption protocol that secures email in transit; popular due to being ‘invisible’, i.e., simple to use.
  • AES-256: a powerful encryption standard primarily used to safeguard stored data, e.g., emails stored in databases or archives.
  • PGP: uses public and private key pairs to encrypt and digitally sign emails for end-to-end security.
  • S/MIME: encrypts and signs emails using digital certificates issued by trusted authorities.

Develop a Patch Management Strategy

One of the most common means of infiltrating company networks, or attack vectors, is exploiting known security vulnerabilities in applications and hardware. Vendors release updates and patches to fix these vulnerabilities, so it’s crucial to establish a routine for regularly updating and patching email delivery platforms and the systems and infrastructure that underpin them.


Additionally, vendors periodically stop supporting particular versions of their applications or hardware, leaving them more susceptible to security breaches. With this in mind, you must track which elements of your IT ecosystem are nearing their end-of-support (EOS) date and replace them with suitable, HIPAA-compliant alternatives.

Implement Continuous Monitoring Protocols

Continuously monitoring your IT infrastructure is crucial for remaining aware of suspicious activity in your email traffic and potential security breaches. Without continuous monitoring, cybercriminals have a prime opportunity to infiltrate your network between periodic risk assessments. 

Worse, they can remain undetected for longer periods, allowing them to move laterally within your network and access your most critical data and systems. Conversely, continuous monitoring solutions employ anomaly detection to identify suspicious behavior, unusual login locations, etc. 

Develop Business Continuity and Disaster Recovery Plans

The unfortunate combination of organizations being so reliant upon email communication, email threats being so prevalent, and the healthcare sector being a consistent target for cyber attacks makes a data breach a near inevitability rather than a mere possibility. 

Consequently, it’s imperative to develop business continuity and disaster recovery protocols so you can resume normal operations as soon as possible in the event of a cyber attack. An essential part of a disaster recovery plan is making regular data backups, minimizing the impact on the service provided to patients and customers.

Implement Email Threat Awareness Training for Employees

Healthcare organizations must invest in email threat awareness training for their employees, so they can recognize the variety of email-based cyber attacks they’re likely to face and can play a role in their mitigation.

Email threat awareness training should include:

  • The different email-based cyber threats (e.g., phishing), how they work, and how to avoid them, including AI-powered threats.
  • Who to inform of suspicious activity, i.e., incident response procedures.
  • Your disaster recovery protocols.
  • Cyber attack simulations, e.g., a phishing attack or malware download.

While educating your employees will increase their email threat readiness, failing to equip them with the knowledge and skills to recognize email-based attacks could undermine your other mitigation efforts. 

Download LuxSci’s Email Cyber Threat Readiness Report

To gain further insight into the most effective email threat readiness strategies and how to better defend your healthcare organization from the ever-evolving threat landscape, download your copy of LuxSci’s Email Cyber Threat Readiness Report for 2025

You’ll also learn about the top email threats facing healthcare organizations in 2025, as well as how the upcoming changes to the HIPAA Security Rule may further impact your company’s cybersecurity and compliance strategies.

Grab your copy of the report here and reach out to us today if you want to learn more.