Image of someone completing a survey for blog about Creating secure online forms

4 min read

Creating secure online forms

As people provide sensitive information through various web platforms, it’s up to businesses and organizations to keep this data secure. Whether it's for financial transactions or complying with strict data privacy regulations, building secure...

Read More
Image of files under a lock for blog about Breaking confidentiality to meet legal obligations

4 min read

Breaking confidentiality to meet legal obligations

Breaking patient confidentiality can occur in certain situations where legal obligations take precedence. These instances are typically regulated to...

Read More
Image of computers connected for blog about How to centralize referral networks through email

1 min read

How to centralize referral networks through email

A single centralized referral network is a tool that allows primary healthcare providers to provide patients with the highest degree of care. These...

Read More
Image of credit card and terminal for blog about HIPAA compliant credit card processing

3 min read

HIPAA compliant credit card processing

HIPAA, as a regulatory framework, imposes strict compliance standards on entities that handle health records. However, credit cards are exempted on...

Read More
Image of wooden blocks for article about What are multi-tiered systems of support?

2 min read

What are multi-tiered systems of support?

MTSS frameworks are rooted in education, creating a structured approach to interventions with students. When this principle is used in other sectors...

Read More
Image of someone typing for article on Are email aliases HIPAA compliant

2 min read

Are email aliases HIPAA compliant

Email aliases can be HIPAA compliant with proper security measures, like encryption, having a business associate agreement (BAA) with the email...

Read More
Image of email icons for blog about What happens when your email provider experiences a data breach

3 min read

What happens when your email provider experiences a breach

Email attacks are responsible for 18.1% of healthcare breaches. When your email provider experiences a data breach involving protected health...

Read More
Image of yellow folder for blog about Developing an emergency response plan for downtime operations

2 min read

Developing an emergency response plan for downtime operations

An effective emergency response plan ensures organizational resilience during unexpected challenges. By proactively preparing for potential...

Read More
Image of boxes for blog about using email to coordinate communication in extreme hoarding cases

3 min read

Using email to coordinate communication in hoarding cases

Hoarding Disorder is characterized by the persistent difficulty in discarding or parting with possessions, leading to an excessive accumulation of...

Read More
Image of triangular warning sign for blog about Malware distribution and defending yourself

4 min read

Malware distribution and defending yourself

Malware distribution refers to the methods and techniques used by cybercriminals to spread malicious software (malware) to victims. Cybercriminals...

Read More
Image of puzzle for blog about Is emailing about a colleague's medical condition a HIPAA violation?

2 min read

Is emailing about a colleague's medical condition a HIPAA violation?

Emailing about a colleague's medical condition is a HIPAA violation. Medical information about a colleague is considered protected health information...

Read More
red folder that says HIPAA confidential

4 min read

What are the penalties for breaching HIPAA?

Breaching HIPAA regulations can lead to severe financial penalties, criminal charges, and reputational damage. The penalties for HIPAA breaches...

Read More
us election colors with email icon and hook for post Combating election-themed phishing attacks

2 min read

Combating election-themed phishing attacks

As the 2024 US presidential election draws near, cybercriminals are using phishing emails to target individuals and organizations. Using aHIPAA...

Read More