For business
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707572986/wp-pme/HIPAA-therapists/HIPAA-therapists.png?_i=AA)
- For business
As with all healthcare professionals in the United States, therapists need to be
HIPAA compliant. They must follow the complex set of interlocking rules that
make up the Health Insurance Portability and Accountability Act (HIPAA).
The purpose of the
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707573113/wp-pme/HIPAA-email/HIPAA-email.png?_i=AA)
This article is part of a series discussing various aspects of HIPAA compliance.
Proton Mail is the world’s largest secure email provider, used by millions to
protect their messages. We provide HIPAA compliant email to thousands of
organizations, and
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707573242/wp-pme/HIPAA-compliance/HIPAA-compliance.png?_i=AA)
The Health Insurance Portability and Accountability Act (HIPAA) defines how
healthcare services and their business associates in the United States handle
sensitive data about their clients.
Regulated by the Department of Health and Human Services (
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707573587/wp-pme/HIPAA-violation/HIPAA-violation.png?_i=AA)
- For business
As a secure email service that provides end-to-end encrypted communications
technology, we receive many inquiries from organizations that are required to
comply with the United States’ Health Insurance Portability and Accountability
Act (HIPAA). To h
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707573592/wp-pme/HIPAA-checklist/HIPAA-checklist.png?_i=AA)
- For business
This post was updated on June 22, 2022
As discussed in our article on HIPAA Compliance, the Health Insurance
Portability and Accountability Act (HIPAA) is a collection of closely aligned
regulations that protect the medical data of patients in the U
![Illustration of someone working from home.](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707575160/wp-pme/ProtonMail-Blog-WFH/ProtonMail-Blog-WFH.png?_i=AA)
Working from home is one of the many massive societal changes that COVID-19 has
forced upon the world. Millions of people are now handling sensitive work data
outside their office for the first time. It can be hard enough to keep data
secure in the o
![The IT security experts at Proton Mail share their tips for securing your business's devices and network.](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707575584/wp-pme/ProtonMail-IT-security-ebook-small-business/ProtonMail-IT-security-ebook-small-business.jpg?_i=AA)
IT security is crucial to success in today’s economy. A data breach can cost you
time, money, and your customers’ trust. Yet, due to a lack of funding, time, and
expertise, most small- and medium-sized businesses (SMEs) are unprepared to deal
with ba
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707575821/wp-pme/ProtonMail-Web-Blog-Phishing-Statistic-1-A/ProtonMail-Web-Blog-Phishing-Statistic-1-A.jpg?_i=AA)
Phishing statistics show that malicious emails are the most common threat to an
organization’s security. The consequences can be extremely harmful to your
business.
Given the alarming statistics on phishing attacks, it’s clear that email
security sh
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707575857/wp-pme/ProtonMail-Web-Blog-6-common-mistakes-1-A-2/ProtonMail-Web-Blog-6-common-mistakes-1-A-2.jpg?_i=AA)
Malware and social engineering are the top two types of cybercrime methods
businesses have to face. Here’s how to prevent these attacks from hurting your
business.
Each quarter, the security firm Positive Technologies releases statistics on the
most
Cyber criminals target small businesses because they know small businesses —
short on time, resources, or expertise — cannot always secure their data. But
the cost of not securing your company’s data has never been higher. The data
breaches themselve
![small-business-employees-IT-security](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1707575892/wp-pme/ProtonMail-small-business-employees-IT-security-IM/ProtonMail-small-business-employees-IT-security-IM.jpg?_i=AA)
In a previous infographic, we showed that small businesses are prime targets for
hackers. One reason is that small businesses often have less capacity to train
their employees on IT security. This makes them the perfect target for phishing
attacks.