Category Archive for "Real-time Tracking"

mobile work

Secure Messaging and Mobile: There’s an App For That

What did we do before we could use our smartphones and tablets to send and receive business emails (or any emails for that matter)? For those who are too young to remember, the process went something like this: We’d wait

Read More
alt=""

5 Reasons to Re-evaluate Your Existing Encryption Solution

There comes a time in many relationships where the terms need to be re-evaluated. Is the relationship giving you what you need? How could it better serve you? Your business’ relationship with security is no exception. The tools you implemented

Read More
alt=""

5 Ways Secure Messaging is Different than Standard Email Encryption

Email encryption will likely always be part of any secure messaging tool, but email security technology for businesses has come a long way in the past decade. With all of its advancements, encryption alone is where the similarities between the

Read More
alt=""

Email Encryption: What if You’re on the Receiving Side?

From a usability perspective, email security providers often spend a lot of time talking about the end-user experience as it relates to employee adoption. This makes sense because the employees of the organization that is purchasing the security product are

Read More
alt=""

Secure Health Information Exchange (HIE) Doesn’t Have to be Complicated

What are the options for individual physicians and doctors’ offices when it comes to securely sharing information electronically with other healthcare providers? It seems for many it’s not entirely clear what standards and technologies can be used to support and

Read More
Secure_Messaging

Secure Messaging is Far More than Email Encryption

Picture a scenario where a healthcare professional accidentally emails Patient A the medical history of Patient B. While the email may be encrypted it still ends up in the inbox of the wrong person who now has access to it.

Read More
Secure Messaging

Leveraging Secure Messaging in the Fight Against Ransomware

It is labeled the “Threat of the Month” in SC Magazine UK. In a recent FBI press release it is called “the most current and significant ransomware threat targeting U.S. individuals and businesses” with victims reporting losses of more than

Read More
alt=""

New Opportunities for MSPs in Cloud Security for Healthcare

The past several years have brought significant change for managed services providers (MSPs). The move from on-premise solutions and services to cloud-based offerings that support a broad array of devices is one of the biggest IT transitions MSPs have ever seen.

Read More
exec

Getting Executives Excited About Secure Messaging

Getting senior executive buy-in and budget support for security initiatives is not always easy. As we talked about in this recent post, communication between security executives and senior leadership can be irregular. However, secure messaging can be an initiative that

Read More
CD

Lost CD in the Mail Causes Healthcare Security Breach

Lost Data by Jacob Whittaker 7.8.08 Some security breaches make you shake your head in disbelief. Jersey City Medical Center (JCMC) notified patients that their information may have been compromised after an unencrypted CD was lost in the mail en route to a supplier. remeditated attacks by hackers often leverage

Read More