We'd like to answer one of the most common questions that we get about HIPAA compliant email. One of the visitors to our site asked us... "How is the e-mail encrypted when the client/patient responds to your encrypted e-mail you send to them? I understand the e-mail you send to them is encrypted, but I [...]
Last week, we were sitting in a conference room with 20 people. These were smart people. All highly educated. They all use computers every single day. We were talking to them about ways to keep safe online. The conversation ranged from phishing to ransomware to staying safe at home. It was fun to be with [...]
A lot of companies make a huge mistake when it comes to G Suite and HIPAA. They think that all they have to do is sign a HIPAA Business Associate Agreement (BAA) with Google, and they're suddenly HIPAA compliant. Nothing could be further from the truth. Here's the story of Ted (not his real name). [...]
Health care providers must follow the Health Insurance Portability and Accountability Act (HIPAA). Is Office 365 HIPAA compliant, though? This act protects your patient healthcare data (PHI). As more clinicians are electronically transmitting patient records and other personal information to specialists and medical facilities, it is imperative that we ensure that information is secure. Isn’t [...]
So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]
You can use email securely and still remain compliant with HIPAA. Here are seven tips for securely using email in a HIPAA-compliant organization.
Practical tips to find the best HIPAA compliant hosting for your business.
Is Gmail secure? Let's walk through the security features they have, and think about how they work in the real world. 1) Is Gmail Secure against Phishing? Hackers use "phishing" attacks to either steal your data or get control of your computer. They'll send you an email with either a link or an attachment. [...]
Website hacked? Are you worried that it might be? More importantly, would you even know if it is? Are you a website hacking target? You might think that your business is too small to be hacked. Think again. You’ll be blown away by these stats, courtesy of a terrific article by Joey Song: [...]
Many practices want to use cloud storage services like Google drive and hosted email. Is Google’s G-Suite HIPAA compliant? […]