digital concept of cyberattack

2 min read

Safeguarding against business email compromise (BEC) in healthcare

Business email compromise (BEC) remains one of the most costly cyber threats facing organizations, with the FBI's 2023 Internet Crime Report revealing $2.9 billion in reported losses from 21,489 complaints. Despite a slight decrease in incident...

Read More
Image of phone being held up towards a cloud.

2 min read

Securing patient data in cloud email systems

As healthcare organizations increasingly migrate to cloud-based email solutions, protecting patient data becomes more complex. The centralization of...

Read More
Image of someone checking email on a tablet

2 min read

Securing healthcare email authentication with DKIM

Domain Keys Identified Mail (DKIM) provides a layer of email security for healthcare organizations by ensuring email authenticity and preventing...

Read More
Image of white puzzle piece fitting into a large puzzle.

2 min read

What is interoperability in healthcare?

The National Institute of Health describes interoperability as “‘The ability of two or more systems or components to exchange information and to use...

Read More
Image of someone writing on a calendar.

2 min read

What is the 60-day timeframe?

The 60-day time frame refers to how long HIPAA covered organizations have to report a breach. According to the Congressional Research Services, “The...

Read More
Image of location pins in a downtown environment

2 min read

Gravy Analytics hit with another lawsuit over massive data breach

Gravy Analytics faces another lawsuit over a data breach that allegedly exposed millions of mobile phone coordinates, reigniting concerns over...

Read More
Image of someone in a hoody and a lock.

2 min read

What are ransomware recovery costs? 

Ransomware recovery costs are made up of costs that extend far beyond the ransom payment itself. On average organizations can expect these costs to...

Read More
red digital security lock

2 min read

Brute force attack targets VPNs with 2.8 million IPs

A brute force attack using 2.8 million IPs is targeting VPNs and security devices, posing a serious threat to enterprise networks.

Read More
google analytics logo

1 min read

Is Google Analytics HIPAA compliant? (2025 update)

Based on our research, Google Analytics is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and...

Read More
medical shield with floating digital icons

2 min read

Embracing new opportunities for healthcare in 2025

The healthcare sector began 2025 facing a challenging environment shaped by extraordinary events from the previous year.

Read More
activecampaign logo

1 min read

Is ActiveCampaign HIPAA compliant? (2025 update)

Based on our research, ActiveCampaign is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...

Read More
Image of lock

2 min read

SOPs for HIPAA compliant communication

Ensuring HIPAA compliance in communication is a critical responsibility for healthcare organizations, business associates, and any entity handling...

Read More
Image of devices including computer, tablet, and laptop.

1 min read

BYOD best practices in healthcare

The rise of bring-your-own-device (BYOD) policies in healthcare settings creates unique security challenges for protecting patient information. With...

Read More