What did we do before we could use our smartphones and tablets to send and receive business emails (or any emails for that matter)? For those who are too young to remember, the process went something like this: We’d wait
There comes a time in many relationships where the terms need to be re-evaluated. Is the relationship giving you what you need? How could it better serve you? Your business’ relationship with security is no exception. The tools you implemented
Email encryption will likely always be part of any secure messaging tool, but email security technology for businesses has come a long way in the past decade. With all of its advancements, encryption alone is where the similarities between the
From a usability perspective, email security providers often spend a lot of time talking about the end-user experience as it relates to employee adoption. This makes sense because the employees of the organization that is purchasing the security product are
What are the options for individual physicians and doctors’ offices when it comes to securely sharing information electronically with other healthcare providers? It seems for many it’s not entirely clear what standards and technologies can be used to support and
Picture a scenario where a healthcare professional accidentally emails Patient A the medical history of Patient B. While the email may be encrypted it still ends up in the inbox of the wrong person who now has access to it.
It is labeled the “Threat of the Month” in SC Magazine UK. In a recent FBI press release it is called “the most current and significant ransomware threat targeting U.S. individuals and businesses” with victims reporting losses of more than
The past several years have brought significant change for managed services providers (MSPs). The move from on-premise solutions and services to cloud-based offerings that support a broad array of devices is one of the biggest IT transitions MSPs have ever seen.
Getting senior executive buy-in and budget support for security initiatives is not always easy. As we talked about in this recent post, communication between security executives and senior leadership can be irregular. However, secure messaging can be an initiative that
Lost Data by Jacob Whittaker 7.8.08 Some security breaches make you shake your head in disbelief. Jersey City Medical Center (JCMC) notified patients that their information may have been compromised after an unencrypted CD was lost in the mail en route to a supplier. remeditated attacks by hackers often leverage