Top 5 (Blissful) Last Min Tech Gifts You just woke up in cold sweat because you realized that you never bought holiday gifts for your cousins who love regulations, your forgetful uncle Jerry, your quick-minded aunt, your tech-savvy nieces and nephews, and of course something for you. Now shipping deadlines have passed, store shelves are barren, and inflation has made some of those must-have items 3x what they should cost. And forget about wrapping up those gifts, as there’s hardly an [...]
We’ve Finally Figured Out the Price of Peace-of-Mind (Hint: It’s Not Priceless) While you are in your turkey-tryptophan-induced state of (peace-of-) mind, we thought we’d include you in our insights of the price people generally are comfortable paying for peace-of-mind. Our crack team at RPost has been working tirelessly to answer one of the most pressing questions in modern economic theory: what is the precise sensitivity point human [...]
Folklore of Opportunistic Privacy There is a wide body of people that believe they are sending information private because they are sending using Microsoft Office 365, Gmail, or using a third-party service that sends all messages using transmission layer security. And they may be right; if secure sometimes is good enough. There is the notion of “opportunistic privacy” also referred to as “opportunistic TLS”, which sounds pretty cool. It certainly s [...]
Pig Latin, Russian Spies and Email Encryption With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential [...]
Not All TLS is Created Equal Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details. Here, we will try to (in a simple manner) decipher a commonly referred to catch all for security, TLS, and explain why the details are important. “Not a [...]
Should You Trust Your Fax? Habits are often hard to break. Some professional offices, particularly in the health care sector, when there is a need to send something private, send by fax. Their belief is, if they send by fax, the transmission is secure and private (HIPAA compliant). While they may have maintained this way of communicating out of habit or by policy, the environment in which they are communicating has changed. No longer, at the receiving end, are people [...]
As consumer awareness of data privacy issues increases, companies that don’t take their clients’ data privacy seriously are getting hit harder and harder. In healthcare, a Florida healthcare provider paid a $5.5 million fine (a HIPAA record) earlier this year for allowing more than 115,000 patient records to be improperly accessed and disclosed. Last year, Ashley Madison paid almost $1.6 million to settle charges related to Federal Trade Commission (FTC) enforcement of data privacy laws, aft [...]
We hope you are enjoying the “Tech Trends to Expect in 2017″ series. Last week, we made the second of three weekly predictions on technology trends we think will manifest in 2017. Here’s our third and final prediction of the series: Prediction 3: Cybersecurity will be a primary purchase driver for consumers shopping for professional servi [...]
With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections or “Brexit” votes, or the pervasive pressure to comply with HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential exposure, and its mere use can demonstrate [...]
Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA auditors who have been redoubling their efforts to investigate non-compliance across the health care industry. For exampl [...]
June 17, 2022
June 10, 2022
June 03, 2022
May 27, 2022
May 20, 2022