TeleMental Health Blog

0

Endpoint Protection

Securing your Network (Part III): Endpoint Protection Systems What is Endpoint Protection? Endpoint protection refers to the process of protecting a business network by securing the various endpoints connected to the network. An endpoint is a device that connects to …

0

Email Protection

Using Clinical Email (Part II): Secured Email Protection Systems by Monica McCormack and Marlene M. Maheu, PhD When does email need to be HIPAA Compliant?  Email is subject to the HIPAA Security Rule and therefore must have the proper measures …

0

PSYPACT Delaware

Delaware Enacts PSYPACT The Association of State and Provincial Psychology Boards (ASPPB) recently announced that Delaware’s Governor John Carney signed PSYPACT legislation (DE HB 172) into law on June 27th, 2019, making Delaware the 11th state to enact PSYPACT. ASPPB …

0

Phishing Email

Phishing Emails and Why Encryption Software is Warranted One of the most common ways hackers gain access to a computer system is through phishing emails. Phishing emails can be difficult to recognize as hackers disguise themselves as a trusted entity, …

0

CSWA Joins TBHI Text Therapy Online Training

TBHI is delighted to announce that Clinical Social Work Association (CSWA) Policy and Practice Director, Laura W. Groshong, AM, LICSW, is joining Marlene Maheu, PhD in Telebehavioral Health Institute’s (TBHI’s) “Is Text Therapy Goof For Your Practice? Telehealth Legal/Ethical Requirements” …