What is 2-factor authentication (2FA) vs multi-factor authentication (MFA)? 2-factor authentication is a security measure where users must confirm who they are by providing just two pieces of proof before they can receive access to a device (e.g. computer, phone),...
When it comes to protecting ePHI, one of the first lines of defense is a strong password policy for all systems that house sensitive information. HIPAA has set out guidelines for creating, changing and protecting passwords. It’s critical that covered entities follow...
Mobile devices have made life a lot easier for many of us, but they’re not without their faults. In recent years, healthcare providers and other covered entities have been relying more on smartphones, tablets and other mobile devices to get their jobs done. However,...
Telephone answering systems are a huge part of any medical practice. They help keep things running smoothly and allow for easy communication between your practice and your patients. For a long time, everything was analog and messages were being stored on tape, but now...
HIPAA has numerous rules and regulations to adhere to when it comes to patient health information. The evolving world of Internet technology has complicated this to some degree, and that includes the existence of email communication. If email messages contain...