0

Endpoint Protection

Securing your Network (Part III): Endpoint Protection Systems Behavioral health practices handle protected health information (PHI) regularly, and as such, must take precautions to safeguard the sensitive information. The Department of Health and Human Services (HHS) recommends ten practices that …


0

Email Protection

Using Clinical Email (Part II): Secured Email Protection Systems by Monica McCormack and Marlene M. Maheu, PhD In this 2019 update of the use of clinical email, we discussed the importance of implementing cybersecurity practices to safeguard protected health information …


0

Phishing Email

Phishing Emails and Why Encryption Software is Warranted One of the most common ways hackers gain access to a computer system is through phishing emails. Phishing emails can be difficult to recognize as hackers disguise themselves as a trusted entity, …