Image of someone opening an email.

2 min read

The role of blockchain in healthcare email security

While traditional solutions like encryption and spam filters are necessary, emerging technologies like blockchain offer new possibilities for enhancing email security.

Read More
red computer code

3 min read

How to protect your healthcare practice from insider threats

The U.S. Department of Health and Human Services (HHS) defines insider threats as risks posed by individuals within your organization who have access...

Read More
google drive logo

2 min read

Is Google Drive HIPAA compliant? (2025 update)

Based on our research, Google Drive is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
firmware digital text

2 min read

Firmware and HIPAA compliance

Healthcare organizations must carefully consider the option between downloadable and embedded resources in their email campaigns because this...

Read More
nexhealth logo

2 min read

Is NexHealth HIPAA compliant? (2025 update)

Based on our research, NexHealth is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS)...

Read More
gmail logo

1 min read

Is a free Gmail account HIPAA compliant? (2025 update)

Based on our research, Gmail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
hospital heart monitor

1 min read

Backdoor threat found in widely used patient monitors

What’s new The Cybersecurity and Infrastructure Security Agency (CISA) has identified a backdoor in the firmware of Contec CMS8000 patient monitors,...

Read More
Image of computer for blog about Why small healthcare practices are at greater risk for cyberattacks

3 min read

Why small healthcare practices are at greater risk for cyberattacks

Small healthcare practices often face unique challenges that make them particularly vulnerable to cyberattacks. Despite having fewer resources than...

Read More
amplitude logo

1 min read

Is Amplitude Analytics HIPAA compliant? (2025 update)

Based on our research, Amplitude Analytics is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and...

Read More
Image of stethoscope for blog about River Region Cardiology Associates faces 500k person data breach

1 min read

River Region Cardiology Associates faces 500k person data breach

River Region Cardiology Associates has disclosed a data breach that compromised the sensitive personal and protected health information of 500,000...

Read More
venmo logo

1 min read

Is Venmo HIPAA compliant? (2025 update)

Based on our research, Venmo is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human Services...

Read More
Image of someone in a hood for blog about The anatomy of a phishing attack

3 min read

The anatomy of a phishing attack

Phishing attacks remain one of the most common and effective email security threats, particularly targeting healthcare organizations. According to a...

Read More
Image of gavel for blog about Exploring the HHS Grants Rule and proposed modifications to the Security Rule

1 min read

Exploring the HHS Grants Rule and proposed modifications to the Security Rule

Cybersecurity in healthcare and the management of federal grants emerged as one of the major priorities in 2024, as evidenced by the HHS Office for...

Read More