Blog

HIPAA vs. PCI DSS Compliance

Why do you need to comply with PCI if you’ve already taken care of HIPAA?

HIPAA Compliant Passwords

Maintaining HIPAA compliant passwords is a key step towards protecting ePHI.

7 Ways to Recognize a Phishing Email: Examples of Phishing Email Scams

Here are seven email phishing examples to help you recognize a malicious email and maintain email security.

Top 10 Types of Phishing Emails

Criminals have countless methods and types of phishing emails to trick email users.

Stay Off the HHS Naughty List

Brand degradation and patient exodus will likely occur every time an organization shames their name through a data breach.

PCI Requirements - You're Not Done Yet!

PCI compliance isn’t an event. It’s an ongoing process!

What Are Addressable HIPAA Requirements?

Contrary to popular belief, addressable does NOT mean optional.

How to Send a HIPAA Compliant Email

You can send ePHI via email, but you have to do it securely, according to HHS.

How Does a Firewall Protect a Business?

Get answers to the most common firewall questions.

Vendor-Supplied Defaults Are a Serious Threat

When those defaults aren’t changed, you give hackers Wonka’s Golden Ticket into your system.