Privacy

This summer, Governor Ricardo Rossello was forced to resign after a massive information leak from a messaging application he had been using exposed various levels of corruption and other embarrassing details. Earlier this year, Jeff Bezos certainly experienced a similar (though not as damning) information leak when his WhatsApp messages with now-girlfriend, then-mistress Lauren Sanchez revealed he was having an affair. Let’s not even talk about Anthony Weiner… And yet, we continue to see information leaks stemming from messaging applications over and over again.

0

Privacy

Last month, GDPR, or the General Data Protection Regulation in the European Union, celebrated its first anniversary. So how are we doing one year later? There are many outcomes that can be attributed to the regulation, some that have improved privacy and some that haven’t had much of an effect. Let’s take a look at some of the developments and highlights of the past year and their impact on privacy:

0

Takeaway: Email and SMS are the most common ways for businesses to communicate. However, they're also the most easily hacked. Organizations need a more secure solution.Digital communications are essential to everyday business operations, but unfortunately, the most commonly used mediums – email and SMS text – are notoriously insecure. Seemingly, every week we read headlines on how these digital correspondence methods are compromised by hackers, nation-states, insider threats and human error.Although awareness of email and SMS vulnerabilities continues to rise, risks remain prevalent among businesses of all sizes. From advancedSEE DETAILS
0

For many older adults, direct contact and an ongoing relationship with physicians is essential to their overall personal care and general well-being. People who believe that they have a strong relationship and ongoing communication with their medical professionals are more likely to be satisfied with their care, share pertinent information for accurate diagnosis of their problems, follow advice, adhere to the prescribed treatment plans and even make referrals to friends. In fact, along with providing quality care, quality communication is essential to maintaining high levels of patient or resident satisfaction.OngoingSEE DETAILS
0

Patient engagement is now a critical component of healthcare, as organizations utilize both traditional and modern communications methods to differentiate their businesses, deliver superior patient care and reduce costs.Today, 74 percent of healthcare executives would like to automate patient engagement, according to a recent study by Conversa Health and World Business Research. Unfortunately, many of these same executives don’t know how or where to begin to do so. From automating patient-generated health data (PGHD) to implementing AI tools for electronics records (EHR) processing, there is no shortage of opportunities toSEE DETAILS
0

Privacy

The high-profile Golden State Killer case is causing experts to debate the privacy implications of using genealogical data from open-source sites, like GEDmatch.com, in criminal investigations.  There are no laws prohibiting detectives from using the data, but law enforcement experts are concerned about potential abuses of this investigative method. Others have argued the tactic represents an invasion of privacy – but does it?

0

With 281 billion emails sent every day, email remains the primary communications platform for business organizations ranging from Fortune 500 companies to growing SMBs – and second place is not even close. Due to this overwhelming reliance on email, it should come as no surprise that these digital correspondences have also become a top target for hackers.In fact, 91 percent of all cyberattacks and 98 percent of social engineering campaigns begin with email phishing scams.While most organizations are aware of today’s phishing threats, and some have deployed various email security and phishing mitigation software to protect theirSEE DETAILS
0

Today’s businesses face unprecedented risks. As mass interconnectivity replaces operational silos, every aspect of business, from transportation and the supply chain to email, data storage, facilities management and financial transactions, are all vulnerable to compromise, disruption and human error. In addition to the people, processes and technology that are at risk in a crisis, so too are the communications mediums most commonly used for incident notification and response.At the forefront of defining their organization’s risk management strategies, risk managers, board members, chief security officers and chief information security officers allSEE DETAILS
0

Can Secure Messaging Protect Against the Most Common Attack Vector?In recent years, the alarming uptick in the frequency and sophistication of cyberattacks targeting critical infrastructure systems has put a spotlight on the emerging vulnerabilities of once disparate, now digitally connected, networks and systems. For the energy and utilities industry specifically, the decade-old quagmire that is information technology (IT) and operation technology (OT) convergence has revealed weaknesses in proactive cybersecurity, incident response and business continuity across both facilities and operations.While the nefarious online activities of nation states and cyber terrorists, alongSEE DETAILS
0

Facebook has been in the news lately, causing its stock value to fluctuate since the 3/16 announcement that it was suspending Cambridge Analytica because of unauthorized access and use of Facebook’s user data. Due to this revelation, the CEO of the company, Mark Zuckerberg, spent two grueling days testifying before Congress to defend his company’s processes, technology and actions. When he was asked, “would you be comfortable sharing the name of your hotel?” he said “no” – ironic given that Facebook tracks its users’ locations. One of the many events that prompted the testimonySEE DETAILS
0