Posts Tagged ‘BYOD’

Secure Messaging ban why the joint commission got it wrong

Secure messaging ban: Why The Joint Commission got it wrong

In its latest update, The Joint Commission banned the use of secure text messaging for patient care orders due to concerns over privacy and security. The decision was a curious one, since it came just a few months after announcing an end to the very same ban. Though its concerns are certainly warranted, as healthcare is the most targeted sector for cyber-attacks, The Joint Commission’s latest assertions against secure text orders are, quick frankly, unsubstantiated. In fact, modern secure messaging platforms not only address the issues raised by The Joint Commission, but can also serve to improve a hospital’s security, efficiency and compliance.

Read More
This is the first in a series that explores various aspects of data from cell phones BYOD & COPE Civial action when merging a personal cell phone with a business phone.

What Might a Judge Do? BYOD and COPE Part 1: A Civil Action

This is the first in a series of posts that will explore various aspects of data from cell phones. As an introduction I would like to “set the stage” by describing a series of facts that all subsequent posts will examine from the viewpoint of a court that must apply legal principles to the facts.

Read More
The simple truth is that security and usability must walk hand-in-hand for anyone choosing a secure IT solution.

Balancing Security and Usability in a BYOD World

“How much security do you want with your software?” It’s a legitimate question that gets surprising answers. Often, the initial answer is “as much as I can have,” “the more the better” or “all of it!” But once people stop to think, they often come up with quite different answers.

Read More
End-to-end encryption provides protection against eavesdroppers and protects a conversation from being intercepted by third parties.

Bold Move for Privacy!

Author–Avi Elkoni In the aftermath of the war between Apple and the FBI, the unexpected announcement this past week from WhatsApp to provide end-to-end encryption for its 1 billion active monthly users is a bold statement for privacy.  In spite of the very public debate about encryption, WhatsApp, an online messaging service, has continued forward

Read More
6 Steps to Ensure Information Protection for Enterprise Text Messaging

6 Steps to Ensure Information Protection for Enterprise Text Messaging

The ARMA Information Governance Principles are very relevant to today’s world of mobile communications. There are 8 of them all together, and in this blog series we will discuss 7 of them in great detail. We will not touch on the principle of Accountability, as having an accountable executive is necessary to the success of any endeavor, not just mobility and mobile messaging. I would like to start this installment with the Principle of Protection.

Read More
Lost devices is a security breach waiting to happen. The need to increase security on BYOD devices has grown to ensure your organization's info is safe.

Security Breach And The Connection To Your Mobile Workforce

Author–Avi Elkoni Today’s workforce has gone beyond mobile. It is fluid. The physical mobility of devices has improved so drastically that the lightest devices from 20 years ago would be the heaviest devices today. People aren’t just working in different places because they have to, they are working everywhere because mobility enables them to. The

Read More
Vaporstream provides a secure consumer messaging system to communicate with service providers and share confidential information with confidence.

Privacy in a 24×7 Connected and Mobile World?

Author–Kristi Perdue Hinkle Privacy a: The quality or state of being apart from company or observation: seclusion b: Freedom from unauthorized intrusion <one’s right to privacy> Private conversations should be private. But in today’s 24×7 connected and mobile world, you and your employees are going to have to earn that privacy. Privacy should not be

Read More
Vaporstream Secure mobile messaging white paper download Keeping your business your business in a mobile world drives confidential and compliant communications.

Keeping Your Business Your Business in a Mobile World

Author–Kristi Perdue Hinkle In a world full of transparency, privacy has become a luxury.  We are constantly surrounded by people – both in person and on-line – that would love to get their hands on our information for fun and profit. Discussions about health, legal and financial matters; mergers and acquisitions; human resources; inventions and intellectual

Read More
Learn how eDiscovery is Evolving in a BYOD World at LegalTech New York to incorporate mobile messaging into your e-discovery, compliance & mobile strategies.

Learn how eDiscovery is Evolving in a BYOD World at LegalTech New York

Vaporstream® will be back at LegalTech New York 2016 from February 2nd-4th. Meet with Vaporstream’s team of experts for a private meeting to learn how you can effectively incorporate mobile messaging into your eDiscovery, compliance and mobile strategies. The rapid rise of mobile messaging and bring your own device (BYOD) strategies for business has made

Read More
Encryption technology is the most effective way to achieve data security.

Paris Attacks and Encryption Technology: The Debate Continues

Author – Galina Datskovsky, Ph.D., CRM We are seeing much discussion about encryption technology and encrypted communications in the news in the wake of the Paris attack.  The intelligence community did not intercept the communication between the attackers leading up to the attack, and this leads many to believe that encrypted communications must have been

Read More
Businesses benefit from BYOD programs shifting costs to the user - including costs for the hardware, taxes, voice and/or data services, and other associated expenses.

Ephemeral Messaging Protects Privacy in a BYOD Environment

By Mike Koclanes The days of working at a company and receiving a new cell phone on your first day have started to fade away.  Market researcher Gartner Inc. predicts that almost four in 10 organizations will rely exclusively on a policy of Bring Your Own Device (BYOD) — meaning they will no longer provide

Read More
Last weeks AIIM First in Flight North Carolina Chapter kicked off two key events that brought together members focused on raising money for charities and on the topic of information governance (IG).

AIIM First in Flight Chapter Meeting – First Class Forum

By Karen Tremblay Last week the AIIM First in Flight North Carolina Chapter kicked off two key events that brought together members focused on raising money for two great charities and focusing on the topic of information governance (IG). The chapter meeting included two events, First in Flight Chapter Annual Charity Golf Tournament and InfoWorld

Read More

Contact Us

Interested in learning more about Vaporstream Secure Messaging?

Contact Us

Vaporstream Newsletter

Sign up for our newsletter and communications to stay current on what’s happening at Vaporstream. Your privacy is very important to us and we do not sell your information to third-parties.