Security
Users
Cyber Security Training
Access control and monitoring
HIPAA Compliant workspace
HIPAA Awareness Training
Two-factor Authentication
Infrastructure
Layer 7 firewalls
IPS/IDS
Vulnerability Scanning and advanced threat protection
Data
Encrypted sessions for all patient contact
Data encryption at rest and in motion