This white paper describes Hushmail’s security philosophy and outlines the security protocols of our application, network, physical and process security.
Download our "Hushmail Security" white paper (PDF - 237 KB)
This document provides technical information on how authentication and encryption is handled in our range of email services and applications. The security architecture is described in enough detail for a security analysis to determine whether Hushmail is appropriate for various use-cases. This document can also serve as a starting point for a security audit of the Hushmail system.
Hushmail for iPhone lets you take the secure email experience of Hushmail with you anywhere you go. The app supports encrypted email to anyone, two-step verification, Face ID and Touch ID, multiple accounts and aliases, and it’s synced with your webmail account, for seamless access to contacts and settings.
Published on February 15, 2024
Using an EHR is a great way to manage and maintain clinical data in your practice. But there's one crucial gap many EHR systems leave, which could put your practice's security and HIPAA compliance at risk. Read more.