Archive for the ‘Cyber Security’ Category

Under the new rules issued by the Center for Medicare and Medicaid Services HHS providers must develop an emergency preparedness plan.

HHS Gets Serious About Healthcare Emergency Preparedness & Communications

If you are a healthcare provider or supplier that engages with Medicare and Medicaid programs, it’s urgent that you understand and comply with new Department of Health and Human Services (HHS) healthcare emergency preparedness regulations (“EP Regulations”) to protect your access to Medicare and Medicaid programs. Under the new rules issued by the Center for Medicare and Medicaid Services providers must comply by November 15, 2017. That is this calendar year folks.  Are you ready?

Read More
A new Cybersecurity regulation risk assessment for financial services is text messaging.

New Cybersecurity Regulation Risk Assessment for Financial Services: Text Messaging

In March 2017 the nation’s first cybersecurity regulation became law imposing strict cybersecurity measures on financial institutions operating in New York. The new rules specify everything from naming a Chief Information Security Officer, to risk assessments, event notification, encryption, penetration and vulnerability testing, training and monitoring and audit logs.

Read More
Keeping communication open during out-of-course events. The ransomware virus known as ‘WannaCry’ targets Microsoft Windows operating systems.

Keeping Communication Open During Out-of-Course Events

The biggest cyberattack in history has been spreading the globe since last Friday. Spanning across 150 countries, the 300,000 victims have included government agencies, hospitals, manufacturers and universities. When ransomware attack affects your organization how can you keep a secure line of communicaiton with your team? Read on to learn why ephemeral messaging should be a part of your incident response plan.

Read More
FCC, CIA and your privacy and what it means for your security with the new laws in motion.

FCC, CIA and Your Privacy. What Does It All Mean?

It seems that every day we have a slew of new sensational cases and revelations that make us stop and think “Is our privacy over? Does anyone even care? What are we to do to protect ourselves?” I say, relax, the situation is bad, but it is not as bad you might think and probably not for the reasons you might think so.

Read More
Six Cyber Security Steps to Protect Yourself Against Cyber-Crime, from random terrorist attacks to unprecedented economic and geopolitical events.

Six Steps to Protect Yourself Against Cyber-Crime

There is only one thing certain in today’s world, and that’s uncertainty. It was certainly driven home by the election results, where everyone was certain of the outcome, until they were not. It is disconcerting to live in this environment. From random terrorist attacks to unprecedented economic and geopolitical events, we need to almost block out the news cycle. In order to survive in this environment, it is important to make a list of things that are in your control and those that are not.

Read More
5 Lessons for Secure Business Communications in 2017. Learn how to maintain secure business communications and protect your sensitive information.

5 Lessons for Secure Business Communications in 2017

On December 10, 2016, Two articles in the business section of the Wall Street Journal caught my eye. The first article concerned well known Facebook in an article named “Facebook Investors Press Suit On Shares”. It is of particular interest, in that it suggests that “Facebook Inc’s move to change its capital structure was tainted by secret text messages and meddling from financial advisers that pointed to a process rife with conflict of interest…”.

Read More
4 people you should be afraid of none of them is a hackers

Four people you should be afraid of… And none of them is a hacker

Author—Avi Elkoni “Beware of hackers!” everyone says. “Before you send sensitive information think about how you send it; consider information security, encryption, firewalls and secure messaging, because hackers are out to get your precious information!” This is true, but hackers should not be your only concern when considering the safety and privacy of sensitive information.

Read More
Learn how to avoid becoming a cyber hostage against ransomware for your healthcare organization.

3 ways to Avoid becoming a Cyber Hostage

Author–Galina Datskovsky A few weeks ago Hollywood Presbyterian Medical Center was held hostage by hackers.  Yes, literally and unbelievably so!  Hackers got into the hospital data systems and virtually shut down all operations for 10 days.  The hospital chose to pay the ransom of $17,000 rather than risk further embarrassment and no access to their

Read More
Obligations from tech companies to aid the government in defense and criminal investigations has increased.

Hi Tech Obligations in Defense of the US: Part 1 Corporate Communications

Author – Galina Datskovsky There is much controversy regarding the obligation of technology companies to aid the government in criminal investigations over the past year greatly due to increased threat of terrorism.  It has been presented in the press that such tactics are necessary to combat terrorism.  On the other side of the debate, technology

Read More
Five tips to better manage your private conversations in 2016 with social media and email communications..

Five Tips to Better Manage Your Private Conversations in 2016  

Author–Mike Koclanes The events and scandals of the past year have further heightened our awareness about privacy issues in our use of the internet. Nonetheless, it did not slow me down from sharing my thoughts and social media posts but I do think more carefully about what tools I use to spread news.  This year,

Read More
A look back at 2015 with increased interest in cyber security and information security.

2015—A Look Back

Author–Galina Datskovsky Ph.D., CRM, FAI As I look back on the year, I can’t help but marvel on the incredible ups and downs that it has brought with it.  Although there are many to speak of, both personally and professionally for most of us, cyber security has been front and center throughout 2015 and has become

Read More

Contact Us

Interested in learning more about Vaporstream Secure Messaging?

Contact Us

Vaporstream Newsletter

Sign up for our newsletter and communications to stay current on what’s happening at Vaporstream. Your privacy is very important to us and we do not sell your information to third-parties.