Archive for the ‘Ephemeral Messaging’ Category

Under the new rules issued by the Center for Medicare and Medicaid Services HHS providers must develop an emergency preparedness plan.

HHS Gets Serious About Healthcare Emergency Preparedness & Communications

If you are a healthcare provider or supplier that engages with Medicare and Medicaid programs, it’s urgent that you understand and comply with new Department of Health and Human Services (HHS) healthcare emergency preparedness regulations (“EP Regulations”) to protect your access to Medicare and Medicaid programs. Under the new rules issued by the Center for Medicare and Medicaid Services providers must comply by November 15, 2017. That is this calendar year folks.  Are you ready?

Read More
A new Cybersecurity regulation risk assessment for financial services is text messaging.

New Cybersecurity Regulation Risk Assessment for Financial Services: Text Messaging

In March 2017 the nation’s first cybersecurity regulation became law imposing strict cybersecurity measures on financial institutions operating in New York. The new rules specify everything from naming a Chief Information Security Officer, to risk assessments, event notification, encryption, penetration and vulnerability testing, training and monitoring and audit logs.

Read More
Bridging the gap in your circle of care through streamlining communication with Vaporstream text messaging.

Bridging the Gap in Your Circle of Care

More and more healthcare organizations are turning to tools, such as Vaporstream’s Secure Messaging platform, to communicate efficiently and effectively when a patient relies on homecare.

Read More
FCC, CIA and your privacy and what it means for your security with the new laws in motion.

FCC, CIA and Your Privacy. What Does It All Mean?

It seems that every day we have a slew of new sensational cases and revelations that make us stop and think “Is our privacy over? Does anyone even care? What are we to do to protect ourselves?” I say, relax, the situation is bad, but it is not as bad you might think and probably not for the reasons you might think so.

Read More
Six Cyber Security Steps to Protect Yourself Against Cyber-Crime, from random terrorist attacks to unprecedented economic and geopolitical events.

Six Steps to Protect Yourself Against Cyber-Crime

There is only one thing certain in today’s world, and that’s uncertainty. It was certainly driven home by the election results, where everyone was certain of the outcome, until they were not. It is disconcerting to live in this environment. From random terrorist attacks to unprecedented economic and geopolitical events, we need to almost block out the news cycle. In order to survive in this environment, it is important to make a list of things that are in your control and those that are not.

Read More
5 Lessons for Secure Business Communications in 2017. Learn how to maintain secure business communications and protect your sensitive information.

5 Lessons for Secure Business Communications in 2017

On December 10, 2016, Two articles in the business section of the Wall Street Journal caught my eye. The first article concerned well known Facebook in an article named “Facebook Investors Press Suit On Shares”. It is of particular interest, in that it suggests that “Facebook Inc’s move to change its capital structure was tainted by secret text messages and meddling from financial advisers that pointed to a process rife with conflict of interest…”.

Read More
How Ephemeral Messaging can help when “consumer” mobile device habits make their way into the office to keep your information safe.

When “Consumer” Mobile Device Habits Make Their Way into the Office

It is no secret that we are living in a digitally evolving world. The use of personal mobile devices continues to increase as constant advancements bring more and more convenience to our busy lives. With today’s smart phones you can do almost anything you want with just the tap of your finger. It leaves me wondering – what’s next?

Read More
Why Enterprises needs their own texting app to help users communicate instantly and how can mobile communications in the workplace be supported.

Why the Enterprise Needs its Own Texting App

Today’s fast-paced, mobile world offers dozens of solutions to help users communicate instantly at their fingertips. Texting has become the communication method of choice, with 97 percent of Americans using it at least once a day.

Read More
Ephemeral HIPAA Compliant Secure Messaging for the Medical Profession is imperative for hospitals and independent practitioner.

Secure Messaging for the Medical Profession

With the recent approval of secure texting by the Joint Commission, finding a secure, HIPAA compliant messaging solution is imperative for hospitals and independent practitioners. Utilizing secure texting not only enables the safe transmittal of sensitive information but more efficient patient care team communications

Read More
Vaporstream® to attend the HIMSS 2016 Conference in Las Vegas to announce how secure, ephemeral and compliant messaging improves healthcare.

Learn How Secure, Ephemeral and Compliant Messaging Improves Healthcare at HIMSS 2016

Author–Vaporstream Team Vaporstream® is excited to announce that they will be attending the HIMSS 2016 Conference in Las Vegas, Nevada from February 29th to March 4th. The HIMSS Annual Conference & Exhibition brings together over 40,000 healthcare professionals, clinicians, executives, and vendors from around the world. The conference is known for the over 300 education

Read More
Vaporstream Secure mobile messaging white paper download Keeping your business your business in a mobile world drives confidential and compliant communications.

Keeping Your Business Your Business in a Mobile World

Author–Kristi Perdue Hinkle In a world full of transparency, privacy has become a luxury.  We are constantly surrounded by people – both in person and on-line – that would love to get their hands on our information for fun and profit. Discussions about health, legal and financial matters; mergers and acquisitions; human resources; inventions and intellectual

Read More
A look back at 2015 with increased interest in cyber security and information security.

2015—A Look Back

Author–Galina Datskovsky Ph.D., CRM, FAI As I look back on the year, I can’t help but marvel on the incredible ups and downs that it has brought with it.  Although there are many to speak of, both personally and professionally for most of us, cyber security has been front and center throughout 2015 and has become

Read More
Vaporstream and IBM MaaS360 to integrate solutions for enterprise mobility management to deliver ephemeral messaging.

IBM MobileFirst Protect Teams Up with Vaporstream to Deliver Ephemeral Messaging

Author–Mike Koclanes Over 350 Billion text messages are sent each month, many of which contain sensitive personal and corporate information. Secure, encrypted messaging options are the best way to ensure security and compliance with regulations such as HIPAA, FINRA, and Sarbanes-Oxley.  IBM MobileFirst Protect formally known as MaaS360 has come together with Vaporstream® to address

Read More
Governmental efforts to prevent U.S. citizens from having private conversations can be seen as part of our nation’s ongoing debate over free speech.

Private Messaging Technologies and Free Speech

Author–Bill Mahone Your blog in the aftermath of the Paris terrorist attack is very thought provoking.  Governmental efforts to prevent U.S. citizens from having private conversations – in the name of national security – can be seen as part of our nation’s ongoing debate over freedom of speech.  On university campuses there have been a

Read More
Encryption technology is the most effective way to achieve data security.

Paris Attacks and Encryption Technology: The Debate Continues

Author – Galina Datskovsky, Ph.D., CRM We are seeing much discussion about encryption technology and encrypted communications in the news in the wake of the Paris attack.  The intelligence community did not intercept the communication between the attackers leading up to the attack, and this leads many to believe that encrypted communications must have been

Read More
Businesses benefit from BYOD programs shifting costs to the user - including costs for the hardware, taxes, voice and/or data services, and other associated expenses.

Ephemeral Messaging Protects Privacy in a BYOD Environment

By Mike Koclanes The days of working at a company and receiving a new cell phone on your first day have started to fade away.  Market researcher Gartner Inc. predicts that almost four in 10 organizations will rely exclusively on a policy of Bring Your Own Device (BYOD) — meaning they will no longer provide

Read More
Last weeks AIIM First in Flight North Carolina Chapter kicked off two key events that brought together members focused on raising money for charities and on the topic of information governance (IG).

AIIM First in Flight Chapter Meeting – First Class Forum

By Karen Tremblay Last week the AIIM First in Flight North Carolina Chapter kicked off two key events that brought together members focused on raising money for two great charities and focusing on the topic of information governance (IG). The chapter meeting included two events, First in Flight Chapter Annual Charity Golf Tournament and InfoWorld

Read More
Security, privacy, and confidentiality when controlling your content in a less then perfect world.

Controlling Your Content in a Less Than Private World

By Galina Datskovsky Welcome to the first of what we intend to make a series of exciting and provocative discussions regarding security, privacy, confidentiality, and compliance. We take these issues very seriously and want to share our vision with you. At Vaporstream® we all believe: 1. That YOU should be in control of every conversation

Read More

Contact Us

Interested in learning more about Vaporstream Secure Messaging?

Contact Us

Vaporstream Newsletter

Sign up for our newsletter and communications to stay current on what’s happening at Vaporstream. Your privacy is very important to us and we do not sell your information to third-parties.