March 26th, 2019

How Secure Is Your Email Provider?

March 7th, 2019

What is Willful Neglect Under HIPAA?

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), spells out rules for the privacy and protection of health information. The HIPAA Privacy and Security Rules establish standards for implementing physical, administrative, and technical safeguards to ensure that Protected Health Information (PHI) is handled with the utmost confidentiality and integrity. The failure to adhere […]

March 5th, 2019

Secure Texting: Communication’s Unicorn

Does secure texting exist, or is it as elusive as a clear photo of bigfoot? To answer that question, we have to take a look at the main SMS (short message service) protocols. The majority of the world’s texting is done using either the Global System for Mobile Communications (GSM), High Speed Packet Access (HSPA) […]

February 26th, 2019

Email, Calls, Messaging Apps & More: How Can You Secure It All?

In a forgotten time, if an organization wanted to secure their communications, all that they had to worry about was their conversations, postage and landlines. If a business was on the cutting edge of technology, it might use a fax machine as well. In 2019, things are a lot more complicated. To start with we, […]

February 6th, 2019

CalDAV & CardDAV: The Keys to Syncing Your Calendar & Contacts

If you use a calendar app to organize your life, you may have noticed that you can add a new event on your phone and it will be immediately updated to your desktop. Likewise, your contacts can also be updated instantly across your devices whenever you make changes. Have you ever stopped to wonder how […]