Image of someone checking email on a tablet

2 min read

Securing healthcare email authentication with DKIM

Domain Keys Identified Mail (DKIM) provides a layer of email security for healthcare organizations by ensuring email authenticity and preventing tampering during transit. As healthcare cyberattacks continue to rise, understanding and implementing...

Read More
Image of devices including computer, tablet, and laptop.

1 min read

BYOD best practices in healthcare

The rise of bring-your-own-device (BYOD) policies in healthcare settings creates unique security challenges for protecting patient information. With...

Read More
Image of someone typing green code on a laptop.

2 min read

What is remote code execution?

Remote code execution (RCE) has emerged as a security concern in healthcare, recently experienced through the Contec CMS8000 patient monitor...

Read More
Image of stethescope and clipboard

1 min read

What healthcare providers should know about HIPAA compliance and AI

According to a study published in the Future Healthcare Journal, organizations must navigate new compliance challenges while protecting patient data...

Read More
Image of someone opening an email.

2 min read

The role of blockchain in healthcare email security

While traditional solutions like encryption and spam filters are necessary, emerging technologies like blockchain offer new possibilities for...

Read More
red computer code

3 min read

How to protect your healthcare practice from insider threats

The U.S. Department of Health and Human Services (HHS) defines insider threats as risks posed by individuals within your organization who have access...

Read More
google drive logo

2 min read

Is Google Drive HIPAA compliant? (2025 update)

Based on our research, Google Drive is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
firmware digital text

2 min read

Firmware and HIPAA compliance

Healthcare organizations must carefully consider the option between downloadable and embedded resources in their email campaigns because this...

Read More
nexhealth logo

2 min read

Is NexHealth HIPAA compliant? (2025 update)

Based on our research, NexHealth is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
gmail logo

1 min read

Is a free Gmail account HIPAA compliant? (2025 update)

Based on our research, Gmail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
hospital heart monitor

1 min read

Backdoor threat found in widely used patient monitors

What’s new The Cybersecurity and Infrastructure Security Agency (CISA) has identified a backdoor in the firmware of Contec CMS8000 patient monitors,...

Read More
Image of computer for blog about Why small healthcare practices are at greater risk for cyberattacks

3 min read

Why small healthcare practices are at greater risk for cyberattacks

Small healthcare practices often face unique challenges that make them particularly vulnerable to cyberattacks. Despite having fewer resources than...

Read More
amplitude logo

1 min read

Is Amplitude Analytics HIPAA compliant? (2025 update)

Based on our research, Amplitude Analytics is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and...

Read More