Blog Archive

July 8, 2019

Bud Walder

Perspective: Email Security in 2019

The term ‘email security’ covers a lot of territory, as business email remains one of the most active communication (and file exchange) services in the business world, and also an ongoing vector of attack, unauthorized access and abuse. Email continues to be a primary vector for malware, phishing and ransomware attacks. As such – solutions… Read More »

May 22, 2018

Monica Hutton

Where Digital Transformation and Data Breach Notification Laws Intersect

The U.S. recently hit a milestone when it comes to privacy/security regulations. In March, both Alabama and South Dakota signed new breach notification laws. Alabama’s went into effect on May 1st and South Dakota’s will go into effect on July 1. Now all 50 states, plus Puerto Rico, Guam, the Virgin Islands, and the District… Read More »

July 26, 2017

Christian Grunkemeyer

Three good reasons to secure your digital communication workflows

Secure Digital Communications Workflows Reason #1: Secure digital communications workflows are required, whether by government or industry regulations. If you don’t comply you could end up paying large fines. You could lose the right to provide certain services or products. And your reputation could suffer from the public shaming regulators often impose on a company… Read More »

June 26, 2017

Christian Grunkemeyer

Secure Digital Transformation Part 1 – Public Sector Examples

Secure digital transformation. That’s a term we hear a lot in the public sector these days. And it’s one of those terms that can mean a number of things. At its most fundamental level, it is changing the way we work, react, and interact. The public sector is a unique industry with its own set… Read More »

February 28, 2017

Christian Grunkemeyer

Achieve Office 365 CJIS Compliance

Moving from an on-premises Exchange server to Microsoft Office 365 (O365) can have numerous benefits. Microsoft promotes its cloud productivity suite to yield better collaboration, increased productivity and a reduced cost of ownership.  Many state and local government agencies eager for those benefits are making a move to the cloud with O365. According to Microsoft,… Read More »

November 15, 2016

Dr. Peter Tippett

Secure Messaging, mHealth Apps and Guiding Principles for Patient Centered Care

In a recently published white paper on patient centered care, the HCTTF (Health Care Transformation Task Force1) identified the need to put the ‘person’ at the center of care and health services. This excerpt is from ‘Guiding Principle #5’: “Person-centered, value-driven health services networks use alternative payment and care delivery models that accelerate the effective… Read More »

September 1, 2016

Bud Walder

Does secure texting even exist?

This headline popped up in the Washington Times last week regarding email encryption: Democrats warned to use encryption weeks before email leaks Interestingly – even though the article references DNC emails that were hacked and exposed by WikiLeaks, it profiles an open source instant messaging app that uses end-to-end encryption advocated by former (and notorious)… Read More »

August 2, 2016

Pete Cafarchio

Salesforce Service Cloud and HIPAA Compliance

Q: My company sells to the healthcare industry.  Is it a HIPAA violation when my Customer Service Rep replies to a support ticket on Service Cloud?  I mean, Salesforce is HIPAA compliant, right? A: You very well may be in violation of HIPAA standards.  Here’s why. Yes, the Salesforce platform itself can be made HIPAA compliant. … Read More »

June 9, 2016

Pete Cafarchio

Five Salesforce® workflows that put you at risk

If you’re in a regulated industry (Healthcare, financial services, government, etc.) then regulatory compliance applies to the Salesforce workflows that you design and use.  It’s worth taking a closer look at how your data travels to make sure you’re not in violation of HIPAA/HITECH, PCI, FERPA, and the like. The good news is that the… Read More »

December 9, 2015

Andrea Raglione

Navigating The Slippery Slope Of Public Security Disclosure

By Andy Nieto, IT Strategist Previously posted in Dark Reading In talking publicly about cybersecurity, CISOs need to portray capability, strength, and confidence, but without offering critical details that could lead to an attack. Mountain climbers call a narrow ridge with steep drops on both sides an “arête.” Crossing one can be one of the… Read More »

Featured Customers and Partners