Contact Us Schedule A Demo
Cyber Security

At one-point, email may have been the standard communication tool for businesses because of its convenience, but its limitations have become increasingly clear.  It’s time for email to take a backseat. As major news stories in the past few years have indicated – email is often simply not secure. It also is often a medium through which hackers target business—think phishing emails, for example. Finally, it is simply not efficient—people are slow to open their email and slow to respond. Compare this to text messaging (used these days one survey found by over 80% of people for business), which people are much more responsive to.  But the problem is—text messaging doesn’t offer much in terms of security either, and often doesn’t comply with regulations. The question then is—what should companies do to ensure secure business communications? Here are four areas you should focus on.

0

Incident Response

In emergency situations, speed is key for first responders. Law enforcement agencies need to have the tools in place to be able to communicate and coordinate quickly.  Using old and clunky tools—like desktops and laptops—are simply not sufficient for teams to make decisions quickly and securely. And, the traditional radio system can present interoperability problems.

0

Incident Response

Natural disasters, mass shootings, and cyber-crimes are on the rise, and it isn’t just sensationalism.  According to NOAA, (National Oceanic and Atmospheric Administration), there are 10 – 15 disasters per year with costs in the billions, up from 1 or 2 in the 1980s. Not only that, but according to the LA Times, mass shootings are becoming more frequent, and deadlier. Add that into the pot with the numerous cyber-crimes against big and small businesses alike, and it’s time to create a plan.

0

Healthcare

HIPAA may be twenty-two years old but the HIPAA Security Rule—which assures the security of confidential electronic patient information—hit its twenty-year mark just this year.  HIPAA was signed into law in 1996 to protect Americans from losing health insurance coverage when changing jobs or dealing with a lay off and to protect the privacy and security of individual health information. Rules that govern HIPAA’s implementation requirements include the Privacy Rule and the Security Rule, which followed the initial rule 2 years later, issued in 1998.

0

Privacy

These days, it feels like everybody’s talking about encryption and privacy. Whether you work in healthcare, energy and utilities, financial services or some other enterprise—you’ve probably come across debates around privacy, encryption and how to securely communicate to maintain privacy. But with all the news reports and use of buzzwords being thrown around it’s easy to forget the basics. So what do terms like encryption, privacy and man-in-the middle attacks really mean?

0

Healthcare

If you’re in healthcare, you are familiar with MACRA, the Medicare Access and CHIP Reauthorization act of 2015—bipartisan legislation that requires the US Centers for Medicaid and Medicare (CMS) to implement an incentive program. Merit-based Incentive Payment System (MIPS) evaluates clinicians in four areas—Quality, Improvement Activities, Promoting Interoperability, and Cost.

0