calendar and email icon

2 min read

Are appointment reminder emails HIPAA compliant? (2025 update)

Based on our research, appointment reminder emails can be HIPAA compliant if they meet the requirements set by the U.S. Department of Health and Human Services (HHS) to safeguard protected health information (PHI).

Read More
google tasks app

1 min read

Is Google Tasks HIPAA compliant? (2025 update)

Based on our research, Google Tasks is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
facetime logo

1 min read

Can I use FaceTime and be HIPAA compliant? (2025 update)

Based on our research, FaceTime is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
slack logo

1 min read

Can I use Slack and be HIPAA compliant? (2025 update)

Based on our research, Slack is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
Image of shield.

1 min read

Accendo Insurance reports major data breach from business associate

Ascendo Insurance recently announced a breach impacting over 16,000.

Read More
Image of laptop with lock.

2 min read

Implementing DMARC for healthcare email security

Domain-based Message Authentication, Reporting, and Conformance (DMARC) represents the final piece in modern email authentication. For healthcare...

Read More
medical imaging

1 min read

Major security flaws identified in popular medical imaging software

Two significant vulnerabilities have been discovered in widely used medical imaging software, potentially exposing sensitive patient data.

Read More
digital concept of cyberattack

2 min read

Safeguarding against business email compromise (BEC) in healthcare

Business email compromise (BEC) remains one of the most costly cyber threats facing organizations, with the FBI's 2023 Internet Crime Report...

Read More
Image of phone being held up towards a cloud.

2 min read

Securing patient data in cloud email systems

As healthcare organizations increasingly migrate to cloud-based email solutions, protecting patient data becomes more complex. The centralization of...

Read More
Image of someone checking email on a tablet

2 min read

Securing healthcare email authentication with DKIM

Domain Keys Identified Mail (DKIM) provides a layer of email security for healthcare organizations by ensuring email authenticity and preventing...

Read More
Image of devices including computer, tablet, and laptop.

1 min read

BYOD best practices in healthcare

The rise of bring-your-own-device (BYOD) policies in healthcare settings creates unique security challenges for protecting patient information. With...

Read More
Image of someone typing green code on a laptop.

2 min read

What is remote code execution?

Remote code execution (RCE) has emerged as a security concern in healthcare, recently experienced through the Contec CMS8000 patient monitor...

Read More
Image of stethescope and clipboard

1 min read

What healthcare providers should know about HIPAA compliance and AI

According to a study published in the Future Healthcare Journal, organizations must navigate new compliance challenges while protecting patient data...

Read More