Category Archive for "Productivity"

plus

Secure Messaging Plus Productivity

An IT professional once told me that her organization’s secure email solution was so difficult to use that whenever she received a secure message that was addressed to multiple people, she would just wait until someone told her what was

Read More
Reso

Four Secure Messaging Resolutions For 2015

As we blogged about here, 2014 was a challenging year for security. As we head into 2015, its time for security professionals to make a few changes in how they approach secure messaging. Here’s four secure messaging resolutions to consider.

Read More
hospital

Inefficient Communication Costs Hospitals Billions

A survey from the Ponemon Institute of more than 400 U.S. healthcare providers found that workflow inefficiency and an inability to use secure messaging was hurting patient care and costing hospitals billions of dollars annually. The study examined typical workflows

Read More
word

Hosted Security Solutions Must Bring Additional Value to an Organization Above and Beyond Protection

Cyber security threats are on the rise while budgets are on the decline according to the Global State of Information Security® Survey 2015

Read More
usability

Secure Messaging Fails Without Usability

Larry Seltzer wrote this fantastic article called ‘Security fails without usability’ that appeared recently in ZDNet.com. He explores the issue…

Read More
Conf table

Using Secure Messaging To Bridge Executive Communication Gaps

Photo by Keoni Cabral 11.29.10 According to a recent Ponemon Institute Report, nearly a third of IT security teams never speak with their company’s executives about cyber security and of those who did, 23 percent spoke to them only once per year. That means that over half of security

Read More
CD

Lost CD in the Mail Causes Healthcare Security Breach

Lost Data by Jacob Whittaker 7.8.08 Some security breaches make you shake your head in disbelief. Jersey City Medical Center (JCMC) notified patients that their information may have been compromised after an unencrypted CD was lost in the mail en route to a supplier. remeditated attacks by hackers often leverage

Read More
file cab

Nearly Half of Healthcare Breaches Are Caused By File Transfer

file cabinets by redjar 3.1.2000 The 2014 Verizon Data Breach Report found that 46 percent of all healthcare security incidents were related to file transfer i.e. lost USB drives, paper files or backup disks. The report cited here “examined more

Read More
imagine

Imagining Innovation in Email

Manhattan Central Park – Imagine Mosaic www.GlynLowe.com 8.25.12 When Gmail turned ten years old earlier this year, it made people pause and think “Wow, has it really been 10 years?” When Gmail first came on the scene, it was definitely slicker than the other options out there and did add

Read More
Jacob_Schiff_in_a_boardroom

Strong Information Security is Good Branding

Caption: In 1918 it was highly unlikely that cyber security made it onto the agenda of any boardroom discussion. When recruiting a new chief executive to lead a major international retail chain you’d expect a board of directors to look for traits

Read More