Contact Us Schedule A Demo
Energy

For more than a decade, the energy and utilities industry has been investing in smarter energy infrastructure in order to enhance energy grid resiliency, reliability and efficiency. Grid modernization has become essential to integrating an increasing number of renewable energy sources and technologies – or distributed energy sources (DERs) – including electric vehicles, energy storage, private solar and smart appliances.

0

Incident Response

Natural disasters, mass shootings, and cyber-crimes are on the rise, and it isn’t just sensationalism.  According to NOAA, (National Oceanic and Atmospheric Administration), there are 10 – 15 disasters per year with costs in the billions, up from 1 or 2 in the 1980s. Not only that, but according to the LA Times, mass shootings are becoming more frequent, and deadlier. Add that into the pot with the numerous cyber-crimes against big and small businesses alike, and it’s time to create a plan.

0

Patient engagement is now a critical component of healthcare, as organizations utilize both traditional and modern communications methods to differentiate their businesses, deliver superior patient care and reduce costs.Today, 74 percent of healthcare executives would like to automate patient engagement, according to a recent study by Conversa Health and World Business Research. Unfortunately, many of these same executives don’t know how or where to begin to do so. From automating patient-generated health data (PGHD) to implementing AI tools for electronics records (EHR) processing, there is no shortage of opportunities toSEE DETAILS
0

Healthcare

When it comes to dental health, there is a lot that  dental service organizations (DSO) have to do to properly engage their patients; whether to remind them of a six-month check-up or to simply help patients keep on top of their dental care. Everyone who has visited the dentist is familiar with the postcards, phone calls and emails reminding them to schedule (and attend!) their appointments.

0

Healthcare

HIPAA may be twenty-two years old but the HIPAA Security Rule—which assures the security of confidential electronic patient information—hit its twenty-year mark just this year.  HIPAA was signed into law in 1996 to protect Americans from losing health insurance coverage when changing jobs or dealing with a lay off and to protect the privacy and security of individual health information. Rules that govern HIPAA’s implementation requirements include the Privacy Rule and the Security Rule, which followed the initial rule 2 years later, issued in 1998.

0

Healthcare

If you’re in healthcare, you are familiar with MACRA, the Medicare Access and CHIP Reauthorization act of 2015—bipartisan legislation that requires the US Centers for Medicaid and Medicare (CMS) to implement an incentive program. Merit-based Incentive Payment System (MIPS) evaluates clinicians in four areas—Quality, Improvement Activities, Promoting Interoperability, and Cost.

0

Today’s supply chains are increasingly efficient, yet they also present substantial new levels of risk. Whereas supply chain managers of the past were most often concerned with price volatility, shortages and supplier failures, the globally-connected nature of today’s supply chain also makes it highly vulnerable to both physical and digital threats.Since global organizations can support operations with partners in countries with varying infrastructure reliability, incident response plans are often siloed. This lack of continuity has made streamlining communications a severe and sometimes impossible challenge to overcome.  In an era whenSEE DETAILS
0

Privacy

The high-profile Golden State Killer case is causing experts to debate the privacy implications of using genealogical data from open-source sites, like GEDmatch.com, in criminal investigations.  There are no laws prohibiting detectives from using the data, but law enforcement experts are concerned about potential abuses of this investigative method. Others have argued the tactic represents an invasion of privacy – but does it?

0

With 281 billion emails sent every day, email remains the primary communications platform for business organizations ranging from Fortune 500 companies to growing SMBs – and second place is not even close. Due to this overwhelming reliance on email, it should come as no surprise that these digital correspondences have also become a top target for hackers.In fact, 91 percent of all cyberattacks and 98 percent of social engineering campaigns begin with email phishing scams.While most organizations are aware of today’s phishing threats, and some have deployed various email security and phishing mitigation software to protect theirSEE DETAILS
0

Can Secure Messaging Protect Against the Most Common Attack Vector?In recent years, the alarming uptick in the frequency and sophistication of cyberattacks targeting critical infrastructure systems has put a spotlight on the emerging vulnerabilities of once disparate, now digitally connected, networks and systems. For the energy and utilities industry specifically, the decade-old quagmire that is information technology (IT) and operation technology (OT) convergence has revealed weaknesses in proactive cybersecurity, incident response and business continuity across both facilities and operations.While the nefarious online activities of nation states and cyber terrorists, alongSEE DETAILS
0

Leading provider of secure, ephemeral and compliant messaging debuts automated notifications to streamline secure incident response and crisis managementLAS VEGAS (PRWEB) APRIL 12, 2018Vaporstream, the leading provider of secure, ephemeral and compliant messaging, today announced the addition of automated, mass emergency notifications and crisis response workflows to its award-winning messaging solution. These platform additions will benefit organizations within the energy, healthcare, enterprise, government, education and financial services industries, which all require failsafe incident notifications, disaster recovery strategies and business continuity plans.The Vaporstream Secure Messaging Platform’s new automation capabilities for incident notificationSEE DETAILS
0

Leading provider of secure, ephemeral and compliant messaging debuts automated workflows to streamline routine patient communications and reminders at HIMSS18HIMSS, Las Vegas, NV (March 5, 2018)Vaporstream, the leading provider of secure, ephemeral and compliant messaging, today announced the addition of automated healthcare workflows to its award-winning communications solution, empowering providers with the industry’s first HIPAA-compliant secure messaging platform with automated patient care communications. The Vaporstream platform automates routine communications such as the appointment reminder process for clinical care teams, as well as secure communications like pre- and post-surgical engagement, educational and motivationalSEE DETAILS
0

Encrypted communication has entered the mainstream, with consumer apps like iMessage and WhatsApp offering encryption by default. Even Facebook Messenger offers end-to-end encryption if you’re willing to dig through its menus.But encryption is just a small piece of keeping messages safe. It protects correspondence from would-be digital eavesdroppers, but it won’t do much good if a device is lost or stolen. And encrypted messaging won’t shield data from deliberate leaks by employees.Vaporstream lets companies protect their data with ephemeral messaging. Think Snapchat, but for corporate communications. But since companies are required bySEE DETAILS
0

To mitigate cyber threats and the many dangers of email phishing, many power and utilities companies have begun to adopt secure messaging platforms, writes Vaporstream CEO Galina Datskovsky.The following is a Viewpoint by Galina Datskovsky, CEO of secure messaging company Vaporstream.In October 2017, the cybersecurity firm FireEye issued an alarming report accusing North Korean state-sponsored-hackers of targeting the control systems of U.S. electric power companies. While both the purpose and timing of each attempted breach is unclear, FireEye has proven that the nation-state threat actors exploited email as the attack vector, constructingSEE DETAILS
0

Secure Messaging

The revelations Tuesday and Wednesday about the extensive use of Wickr inside Uber upended the high-stakes legal showdown with Alphabet’s Waymo unit, which accuses the ride-hailing firm of stealing its self-driving car secrets. The issue of course is not whether using Wickr or apps like it, including Vaporstream, is acceptable. The issue is when, where and how to use the application and what legitimate use indeed looks like.

0

People send over 20 billion text messages every day worldwide, and Text Request reports 95 percent of texts are read within five minutes of being sent. Because of its convenience, open rates, and speed, text messaging is the preferred method of communication — both for work and personal life. Due to the nature of the profession, texting has become a popular way to communicate in the healthcare industry. However, there’s a need for more secure messaging.Due to the strict requirements of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the rise ofSEE DETAILS
0

Incident Response

Do you have an emergency preparedness plan in your household? Many families do—whether because they live in an earthquake or hurricane prone area, or because they want to be prepared for a personal emergency just in case. A smartphone can provide critical support during an emergency but—like your emergency kit and home vehicle—it needs to be prepared. There are several ways you can prepare your smartphone for an emergency.

0

Incident Response

This past year has been riddled with crisis from wildfires, earthquakes, tornadoes and hurricanes, to global cyber-attacks at a scale unlike what we’ve seen before. The one thing that all of these events have shown us is that accurate and constant communication is critical. Proper notification and continual communication during the event and during response set the tone for how quickly we can recover. Florida and Texas are no strangers to hurricanes.

0

Over the last few years, competitive pressure to offer consumer-focused banking access, as well as opportunities for increased internal efficiency, have led to a surge in text usage across the financial services industry. In fact, major banking corporations like Wells Fargo, Bank of America, U.S. Bank and Chase are all offering SMS text and banking apps to expedite communications and transactions with their customers. While certainly an improvement to convenience and efficiency, financial institutions should strongly consider the potential ramifications of native SMS texting and instead implement a more secure, compliantSEE DETAILS
0

Healthcare

If you are a healthcare provider or supplier that engages with Medicare and Medicaid programs, it’s urgent that you understand and comply with new Department of Health and Human Services (HHS) healthcare emergency preparedness regulations (“EP Regulations”) to protect your access to Medicare and Medicaid programs. Under the new rules issued by the Center for Medicare and Medicaid Services providers must comply by November 15, 2017. That is this calendar year folks.  Are you ready?

0

Financial Services

In March 2017 the nation’s first cybersecurity regulation became law imposing strict cybersecurity measures on financial institutions operating in New York. The new rules specify everything from naming a Chief Information Security Officer, to risk assessments, event notification, encryption, penetration and vulnerability testing, training and monitoring and audit logs.

0

Cyber Security

The biggest cyberattack in history has been spreading the globe since last Friday. Spanning across 150 countries, the 300,000 victims have included government agencies, hospitals, manufacturers and universities. When ransomware attack affects your organization how can you keep a secure line of communicaiton with your team? Read on to learn why ephemeral messaging should be a part of your incident response plan.

0

Healthcare

Unlike healthcare providers, family members are not subject to the privacy and security mandates in the Health Insurance Portability and Accountability Act (HIPAA). However, there is a huge market for medical information, drug prescriptions, social security numbers and credit card numbers on the dark web. Cybercriminals are mastering how to invade devices to steal this exact type of information we bandy about in our family beehives during a health crisis.

0

Healthcare

Quick – when was the last time you used your smartphone to investigate a health issue? If you are like most people you are probably a “connected patient” using smart devices to take more ownership of your health. A 2015 Pew Research Center (PEW) report shows 62% of smartphone owners use their phone to look up information about a health condition. And many of us now also use our smartphones to correspond with providers.

0

Healthcare

Communication and effective collaboration within the healthcare industry is not always as easy as it should be. Care teams – from doctors and nurses to the patients and their caregivers – need the ability to communicate efficiently, effectively, privately and securely to ensure the highest level of service. Unfortunately, this is an ongoing challenge, particularly when it comes to long term and home based healthcare.

0

Cyber Security

There is only one thing certain in today’s world, and that’s uncertainty. It was certainly driven home by the election results, where everyone was certain of the outcome, until they were not. It is disconcerting to live in this environment. From random terrorist attacks to unprecedented economic and geopolitical events, we need to almost block out the news cycle. In order to survive in this environment, it is important to make a list of things that are in your control and those that are not.

0

Consumer

In Chicago, the leaves have all fallen, the air is getting colder and glittery Holiday displays have begun to surround us. Fortunately, it is also the time of year when we can slow down and sit with our loved ones to give thanks for all that has brought us good fortune this year.

0

Healthcare

The healthcare industry, by nature, demands a high level of privacy and compliance, but it also demands quick communication between care providers to ensure best-in-class patient care. Therefore, many healthcare providers are turning to mobile devices to enable faster, more efficient communications. “Today, short mobile communication methods like text is getting immediate response and better read rates, facilitating a new way of doing business,” said Galina Datskovsky, CEO of Vaporstream. But what happens to information and images that are texted and left on these personal devices? How do you maintain privacy, security or compliance?

0

Secure Messaging

As the workforce becomes increasingly mobile and employees rely on texting for quick, easy communication, organizations across industries have been driven to create policies that guide how the information created by mobile text messaging is managed. These frameworks help to effectively support recordkeeping, answer compliance needs and ensure data availability for eDiscovery. Information governance is one such accepted discipline, ensuring a reasonable level of security for records and information that require protection.

0

Secure Messaging

“Whoever Wins the White House, This Year’s Big Loser is Email.” Thus, reads the headline in the NY Times on October 19, 2016. Indeed, in the current election cycle, month after month, the focus has been on hacked and released emails, on disappearing emails, on emails that reappear on various devices – not of the user’s choosing. It certainly seems that the people who sent those emails should have known better than to write what they actually wrote in the first place.

0

Legal

Today’s mobile lawyers travel constantly, all over the country and world. Many travel to areas known to be less secure and even aggressive when it comes to cyber surveillance. Rightfully so, lawyers and their clients worry about the security of devices and communication methods while traveling abroad, however still require a high standard of responsiveness.

0