.st1{display:none}Insights

HIPAA Email Encryption Requirements

The HIPAA email encryption requirements are that, when emails contain electronic Protected Health Information (ePHI), the emails must be encrypted to a minimum standard unless encryption is found to be an unreasonable or inappropriate safeguard in a risk assessment. HIPAA and the HIPAA Email Encryption ...

HIPAA Compliance for Email

HIPAA compliance for email involves not only ensuring that the systems used to send, receive, and store emails support HIPAA compliance, but also that members of the workforce understand when it is permitted to send Protected Health Information by email – and when exceptions exist. ...

HIPAA Compliance Checklist

The purpose of a HIPAA compliance checklist is to support the good faith efforts of covered entities and business associates to comply with the applicable standards of the Health Insurance Portability and Accountability Act (HIPAA) 1996. Due to the different types of organizations covered by ...

HIPAA Violation Examples

The HIPAA violation examples that most often make the headlines are data breaches involving thousands of records that result in six- or seven-figure settlements. However, these events represent a small percentage of the HIPAA violations reported to the Department of Health and Human Services´ Office ...

HIPAA Training for Students

Not all nursing and medical training courses include HIPAA training for students, and this can result in compliance issues when newly-qualified students are exposed to Protected Health Information (PHI) – even when the students have received mandatory training on a Covered Entity´s policies and procedures ...

What is HIPAA Compliance?

Although most individuals and organization in healthcare-related industries will be aware of HIPAA and the legal requirement to comply with its regulations, there may be some entities looking to enter a healthcare-related industry asking the question “What is HIPAA compliance?” This article intends to answer ...

Developing an Effective MSP Software Security Stack

Most managed service providers are now offering managed security services to some degree, but what products should be included in an MSP software security stack? In this article, we suggest key areas to start with and an approach to take that will help you decide ...

DNS Content Filtering for MSPs

Many cybersecurity companies offer DNS content filtering for MSPs but finding the best solution can be time-consuming. The features included in DNS filtering solutions can vary considerably from provider to provider as can the cost. In this article, we will explain the features you should ...

Cloud Web Filtering Software

Cyberattacks on businesses are becoming much more sophisticated. Defending against these attacks requires a defense-in-depth approach using multiple layers of protection. One of those layers can be provided by cloud web filtering software. Why Businesses Need Cloud Web Filtering Software Cybersecurity solutions used by businesses ...

Benefits of Cloud Based Email Security

More and more businesses are moving to cloud based email solutions, with Office 365 by far the most popular choice, and with cloud-based email, it makes a great deal of sense to also use cloud based email security solutions. Traditionally, businesses would use a secure ...

Phishing Attack Examples

Phishing is the most common way that cybercriminals reach employees. These attacks use social engineering techniques to trick employees into taking actions that help the attackers achieve their aims. In this article, we provide some phishing attack examples to demonstrate the diversity of phishing and ...

Email Encryption for Small Business

In this article, we explain how email encryption for small business can be implemented without the complexity or cost usually associated with encryption and present an email encryption solution that is easy to implement and use and doesn’t have a negative impact on employee productivity. ...

MSP Spam Filtering Services in Great Demand

MSP spam filtering services are proving popular with small- and medium-sized businesses, which are being increasingly targeted by cybercriminals. With most cyberattacks occurring via email, MSPs are increasingly being asked to help their clients deal with the threats. SMBs Look to Their MSPs to Protect ...

Microsoft 365 Email Protection

With phishing attacks continuing to increase, it is no surprise that many businesses are looking to improve Microsoft 365 email protection. Microsoft 365 is an attractive target for phishers and other cyber threat actors because so many businesses use the cloud-based platform. Microsoft figures indicate ...

Email Protection Software

Just a few years ago, all businesses needed was a spam filter to block spam email and malware, but today, a much greater range of email protection software is required to block increasing numerous and sophisticated email attacks. A spam filter alone is no longer ...

Phishing Prevention Tips for Businesses

Phishing is one of the biggest threats that businesses have to deal with but unfortunately, there is no single cybersecurity solution that can fully protect against phishing. Phishing prevention requires a multi-faceted approach, multiple layers of protection, and a combination of technical and non-technical defenses. ...

MSP Phishing Protection Services

Here we take a closer look at MSP phishing protection – easy ways for MSPs to improve their own defenses against phishing attacks and offer MSP phishing protection services to their clients to better protect them against phishing, malware, ransomware, and BEC attacks while generating ...

Spam Filtering Service

All businesses should use a spam filtering service, the cost of which is likely to be recovered from the productivity gains that can be achieved by using these solutions. Spam email is a drain of productivity and while spam email volume has been in decline ...

Cybersecurity Awareness Training Topics and Tips

If you want to develop a security culture in your organization where every employee understands they have a role to play in cybersecurity, they always work securely, and report any threats they encounter, you will need to provide cybersecurity awareness training. In this post, we ...

Phishing Email Training Mistakes to Avoid

Phishing email training can significantly reduce the susceptibility of the workforce to phishing attacks, yet some employers fail to train their employees how to recognize phishing attempts or do not invest sufficient time and resources in improving the security awareness of the workforce. If security ...

Best Practices for Choosing an Email Security Solution

There are important things to consider when choosing an email security solution to ensure it meets the needs of your business. Most cybersecurity vendors offer an email security product, and while most will meet the needs of a broad range of businesses, finding a great ...

Phishing Training for Employees

Phishing training for employees is one of the most neglected aspects of cybersecurity, even though studies and phishing simulation data show that training can significantly improve an organization’s security posture. Many cyberattacks target employees and try to trick them into handing over sensitive data or ...

Office 365 Phishing Protection

Office 365 is a fantastic suite of productivity-enhancing software solutions, but the Office 365 phishing protection capabilities leave a lot to be desired. While the free security offering, Exchange Online Protection (EOP), has sufficiently good spam and phishing email detection capabilities for personal users, businesses ...

Common Indicators of Phishing Attempts

Phishing is one of the most common ways for cybercriminals to obtain sensitive data, access bank accounts, and gain a foothold in business networks, so it is essential for all members of the workforce to understand the common indicators of phishing attempts and be conditioned ...

What is a Phishing Simulator and Why Do I Need One?

Using a phishing simulator to conduct internal dummy phishing tests on employees is a good way to reenforce security awareness training. Reading about phishing tactics and techniques in training courses can help employees to understand the threat of phishing; however, sending dummy phishing emails internally ...

Best Practices for Preventing Phishing Attacks

Phishing is the main way that cyberattacks on businesses start and attacks increased significantly during the pandemic. Phishing has also become much more sophisticated and harder to block; however, there are best practices for preventing phishing attacks that can greatly reduce the risk of an ...

Cloud Web Security

More cyberattacks and data breaches are occurring than ever before and cyber threats are becoming increasingly sophisticated. Many businesses are now turning to cloud web security services to improve their defenses, as standard security solutions are failing to block all threats. Many Cyber Threats are ...

Email Security Solutions for Businesses

As the Verizon 2022 Data Breach Investigations Report (DBIR) shows, email is a leading attack vector in cyberattacks. To block this common attack vector, an email security strategy should be developed to address all weaknesses related to email, which is likely to include multiple email ...

MSP Security in the Spotlight

Cyber threat actors are increasingly targeting managed service providers (MSPs) and have been exploiting lax MSP security to gain access to MSP networks, then abusing the privileged access to client systems to conduct extensive attacks on downstream businesses. According to data from Check Point, cyberattacks ...

Email Protection

One of the most effective email protection measures is greylisting – a process that automatically returns inbound emails to their originating servers with a request for the email to be resent. In tests, greylisting has increased spam detection rates from 99% to 99.9% – significantly ...

1236 Next