181 results found for ""
What Is Direct Secure Messaging?
If you work in the health care industry, you may have heard the terms “Direct," “Direct Exchange,” “Direct Secure Messaging” or “DSM” several times.
What Exactly Is a HISP?
In the healthcare industry, data is everything. From research to treating patients, having the right data to work with is critical. However, when patients need to see different doctors or specialists to receive treatment, exchanging information can become confusing.
Major Email Compliance Regulations That You Need to Know
Keeping up with industry and government email compliance regulations impacting the exchange of sensitive information can be exhausting.
Best Practices: Securing Data at Rest, in Use, and in Motion
Sensitive business data is more vulnerable today than ever before. Corporate trade secrets, national security information, personal medical records, Social Security and credit card numbers are all stored, used, and transmitted online and through connected devices. The proliferation of valuable data provides cybercriminals with an increasingly wide range of opportunities to monetize stolen information and […]
Salesforce Service Cloud and HIPAA Compliance
Q: My company sells to the healthcare industry. Is it a HIPAA violation when my Customer Service Rep replies to a support ticket on Service Cloud? I mean, Salesforce is HIPAA compliant, right? A: You very well may be in violation of HIPAA standards. Here’s why. Yes, the Salesforce platform itself can be made HIPAA compliant. […]
Best Practices: HIPAA Email Compliance – Patient Records
With new HIPAA regulations, patients can have even more access to their medical records. With many patients wanting to receive their information by email, does your organization know the best practices for emailing patient records in compliance with HIPAA? In January 2016, the HIPAA regulation got more teeth in the area of providing patients their […]
How safe are HTTPS connections? Not as safe as you think.
While using the internet, there’s a chance that you’ve noticed some websites using HTTP connections while others use HTTPS ones. The major difference between these is that HTTPS connections are considered “secure” while HTTP ones are not. This begs the question, how safe really are HTTPS connections? When making an online purchase, any reputable website […]
Achieve Office 365 CJIS Compliance
Moving from an on-premises Exchange server to Microsoft Office 365 (O365) can have numerous benefits. Microsoft promotes its cloud productivity suite to yield better collaboration, increased productivity and a reduced cost of ownership. Many state and local government agencies eager for those benefits are making a move to the cloud with O365. According to Microsoft, […]
Unveiling Email Vulnerabilities: Is TLS Email Encryption the Complete Answer?
Digital information exchange is paramount, and the security of sensitive data is equally as significant. Various encryption protocols must be deployed to maintain the highest levels of security, ensuring the integrity and confidentiality of digital communications. One such essential technique is Transport Layer Security (TLS). This comprehensive discussion aims to delve into the intricate details […]
Is Encryption Enough to Protect Yourself?
Is Encryption Enough to Protect Yourself?