5 Reasons to Embrace Secure Communications for Senior Living

Mobile devices have become ubiquitous in day-to-day life. The majority of Americans own a smart phone and use it not just for personal matters but for professional matters, too. It’s a technology that spans gender, location, profession and age &#… Continue reading 5 Reasons to Embrace Secure Communications for Senior Living

Incident Response in the Oil and Natural Gas Industry: It’s All About Communications

After Hurricane Sandy in 2012, the Department of Energy (DoE) asked the National Petroleum Council (NPC) to provide specific actionable steps to better prepare the oil and natural gas industry’s response to natural disasters. In response, the NPC… Continue reading Incident Response in the Oil and Natural Gas Industry: It’s All About Communications

The Nuclear Industry and Communication: Lessons from Three Mile Island

It’s been forty years since the infamous Three Mile Island accident, an incident made famous bythe confusion and panic it spawned in its wake. But while the incident is remembered for the fear it stoked about nuclear energy, it also set the stage… Continue reading The Nuclear Industry and Communication: Lessons from Three Mile Island

Password Protection in the Enterprise – Secure Way to Communicate and Protect

They’re a basic foundation of security, yet somehow constantly dismissed.
Passwords are one of the most important components of a strong cybersecurity strategy—but employees overwhelmingly have bad password habits – despite all attemp… Continue reading Password Protection in the Enterprise – Secure Way to Communicate and Protect

Making Sense of Security, Privacy and Confidentiality in Texting

Today, pretty much everyone is texting. It’s made life so much easier – send a message on your own time and preferred device, usually without having to stop what you’re doing, and rest assured that the recipient will receive the messa… Continue reading Making Sense of Security, Privacy and Confidentiality in Texting

The problem with vulnerable IoT companion apps

There’s no shortage of exploitable security holes in widely used Internet of Things devices, so it shouldn’t come as a surprise that the communication between many of those devices and their companion apps is not encrypted. The research A g… Continue reading The problem with vulnerable IoT companion apps

Australia: Parliament passes anti-encryption bill

The Parliament of Australia has passed the Assistance and Access Bill 2018, which allows Australian authorities to pressure communication providers and tech companies into giving them access to encrypted electronic communications, all in the name of fi… Continue reading Australia: Parliament passes anti-encryption bill

Government Messaging Solutions for the 21st Century: Think Beyond Encryption

The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate. White House staffers have reportedly usedthe encrypti… Continue reading Government Messaging Solutions for the 21st Century: Think Beyond Encryption

Preventing Man-in-the-Middle Attacks

When it comes to cyber security, sometimes the jargon can feel overwhelming. Ransomware, encryption, man-in-the-middle attacks… The Vaporstream blog has covered ransomware and encryption in the past, so today I wanted to focus on what a… Continue reading Preventing Man-in-the-Middle Attacks

Empowering Patients Though Increased Engagement

Patient engagement is a critical piece of healthcare. Today, more than 74 percent of healthcare executives have a desire to automate their patient engagement. As is often the case however, when it comes to automating engagement, these executives a… Continue reading Empowering Patients Though Increased Engagement