Is TigerText HIPAA Compliant?
TigerConnect is a communications platform that allows users to send secure messages, photos, videos, notes, and voice recordings through their TigerText service. TigerConnect specifically designed their product [...]
TigerConnect is a communications platform that allows users to send secure messages, photos, videos, notes, and voice recordings through their TigerText service. TigerConnect specifically designed their product [...]
As an MSP with healthcare clients, it is important to understand how HIPAA applies to you and your clients. As your clients’ trusted advisor, your clients will rely on [...]
ProtonMail is an email encryption service that is designed with businesses in mind, enabling users to send and receive secure emails. But when you work with protected health information, [...]
Zapier is an automation tool that enables software applications to be integrated, allowing products that don’t normally communicate with each other to do so. Being able to integrate, say [...]
Is digital marketing HIPAA compliant? The answer isn't so simple. The nature of digital marketing requires businesses to analyze customer data through several types of tools such as SEO, [...]
Fax.Plus is an online fax service that allows businesses to easily schedule faxing, pull detailed reports, import contacts, and automatically retries failed faxes. But, is Fax.Plus HIPAA compliant? The [...]
Many people use their mobile devices for business purposes, but it is important to consider the security implications of doing so. This is especially the case with [...]
Although many businesses have returned to regular operations, there is still a large portion of workers that continue to work remotely, or work on a hybrid schedule. It seems [...]
Since 2019, the Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has brought a number of enforcement actions against healthcare providers for their failure to [...]
Is Carbonite HIPAA compliant? Carbonite is a software solution provider that offers data backup solutions, disaster recovery services, and endpoint protection. These are all security measures that must be [...]