


Is Gmail’s Confidential Mode HIPAA Compliant?
Gmail is exceedingly popular among email users for both personal and business purposes — and for good reason. It’s the second most widely-used email platform, after Apple Mail. It’s well run, user friendly, and quick to address any issues that arise. So it’s no...
Basic HIPAA Guidelines: Annual Update 2022
We recently hosted a webinar, “Annual HIPAA Requirements and Security Standards,” in which we discussed annual HIPAA requirements, document review, and the compliance procedures you need to have in place to prevent breaches and pass audits. In the webinar, we...
How to Use HIPAA to Defend Against Common Cybersecurity Attacks
While much of the anti-malware technology we have to protect us from hackers has become increasingly more sophisticated, so have attackers’ methods. According to the U.S. Department of Health and Human Services (HHS), incidents of hacking affecting 500 people or more...
HIPAA Training for Insurance Agents: Requirements and Strategies
Insurance agents who handle protected health information (PHI) are required to comply with the Health Insurance Portability and Accountability Act (HIPAA). One important aspect of HIPAA compliance is ensuring that all staff members receive appropriate training on...