March 5th, 2019

Secure Texting: Communication’s Unicorn

Does secure texting exist, or is it as elusive as a clear photo of bigfoot? To answer that question, we have to take a look at the main SMS (short message service) protocols. The majority of the world’s texting is done using either the Global System for Mobile Communications (GSM), High Speed Packet Access (HSPA) […]

February 26th, 2019

Email, Calls, Messaging Apps & More: How Can You Secure It All?

In a forgotten time, if an organization wanted to secure their communications, all that they had to worry about was their conversations, postage and landlines. If a business was on the cutting edge of technology, it might use a fax machine as well. In 2019, things are a lot more complicated. To start with we, […]

February 6th, 2019

CalDAV & CardDAV: The Keys to Syncing Your Calendar & Contacts

If you use a calendar app to organize your life, you may have noticed that you can add a new event on your phone and it will be immediately updated to your desktop. Likewise, your contacts can also be updated instantly across your devices whenever you make changes. Have you ever stopped to wonder how […]

January 10th, 2019

What You Need To Know About the HIPAA Security Rule

In this day and age of rampant cybercrime, protecting a patient’s electronic health information is of the utmost importance. But, how do you know if the protections are adequate? Well, that’s where the HIPAA Security Rule comes in. What is the difference between the privacy and security of health information? With respect to health information, […]

December 4th, 2018

Penetration Testing for HIPAA Compliance

Back in the day, the most important concern for a healthcare organization was to provide the best quality of life for its patients and to promote health awareness. However, in this day and age, healthcare organizations also need to worry about protecting patient information.  Some of this is identifiable and sensitive — PHI or Protected […]