Systemizing Data Security: Keep Your Eye on Secure Document Delivery

Systemizing Data Security: Keep Your Eye on Secure Document Delivery - 2pinz

Over the past several decades, organizations across industries have spent countless dollars on information security awareness training, the rationale being that investment in people – their biggest asset – will translate into stronger security protocols and better compliance among staffers. However, successfully changing behavior entails far more than training, and it all hinges on systemizing security.

In 2015 we’re going to witness a significant shift from merely promoting awareness to creating solutions and building them into the way that organizations do business.  Currently an organization’s biggest risk factor with respect to data security is its people – and solutions and processes will evolve to address this issue.

The problem with data security solutions generally is that they’re complicated to use and easy to bypass on an individual employee level. And, with respect to email security, the level of risk is perceived as minimal. Read more ›

Posted in Secured Document Delivery

Why Email Security Is Only as Sound as Employee Compliance

Secured Document Delivery I Email Security I Armored Envoy

There are two schools of thought on IT security training.  There are those that believe that training employees on IT security risks and protocols is a worthwhile expenditure and there are those who think it’s a waste of time and dollars.  Most organizations, however, fall somewhere in the middle – the question isn’t a matter of training or no training but rather how much and what kind of training is necessary.

In some industries – like health care and financial services – training requirements are subject to regulatory compliance mandates.  For those industries exempt from these requirements, it’s up to the organization to determine what level and kind of training is appropriate and how much and where they’re willing to spend. Read more ›

Tagged with: , , , , ,
Posted in Email Security

The Top Three Threats that Keep Email Security Experts Up at Night

Secured Document Delivery I Email Security I Armored Envoy

Within most organizations, the nuts and bolts around email security flies under the radar screen – nobody outside the IT group thinks about it until there’s a problem. While most folks are aware of the risks associated with unsecure email, it’s unfortunately generally perceived that these risks are minimal enough to throw caution to the wind.  However, when an actual breach does occur, the damage can be devastating. What are the top three threats around email security that keep email experts up at night?

Employee Error

Employee error is the number one cause of email security breach, and it’s hardly surprising since mistakes happen all the time.  It can be as simple as sending an email containing sensitive personal information to the wrong person – and just about everyone with an email account has either sent or received an email intended for another recipient at one time or another. Read more ›

Tagged with: , , , , ,
Posted in Email Security

Hacked! Protecting Personally Identifiable Information When Your Email Is Under Attack

Secured Document Delivery I Personally Identifiable Information I Armored Envoy

Most people discover that their email account has been hacked well after the fact.  While it’s embarrassing to field calls, text messages and emails from well-intentioned friends expressing concern that you are stranded in Nigeria and in desperate need of $500, embarrassment is only the tip of the iceberg. Hackers can change your passwords so you can no longer access your accounts or retrieve your messages, and they can delete your contacts and correspondence.

Once you become aware that your email account has been hacked, the protocols around damage control are straightforward and critically important. Read more ›

Tagged with: , , , , , , , , ,
Posted in Data Security, Personally Identifiable Information

Banking Breaches and Phishing Scams: Proactively Protecting Customers from Email Fraud

Secured Document Delivery I Phishing I Armored Envoy

With the recent JPMorgan Chase breach affecting an estimated two out of every three households in the U.S., hacking has officially gone mainstream. Reports revealed that data thieves made off with account holders’ names, home addresses, phone numbers and email addresses, and it’s important to note that the risk extends beyond active accounts. In fact, anyone who has logged on to any of the JPMorgan Chase websites or apps is potentially at risk.

Privacy protection experts believe that the biggest risk associated with the breach is that the hackers will successfully draw out more sensitive personal information from affected consumers. And, it’s also possible that the thieves can sell the data to others who can enrich it with publically available online information to create fully-fleshed personal profiles ripe for identity theft. Read more ›

Tagged with: , , , , ,
Posted in Email Security

Medicare Fraud: Is Your Personal Health Information at Risk?

Secured Document Delivery Blog I Medicare Fraud I Armored Envoy

What happens when malicious individuals get ahold of your Medicare information?  They sell it and make a bundle – in fact, your medical information is worth 10 times more than your credit card number on the black market. Medicare fraud perpetrators collect a treasure trove of personal data including names, birth dates, policy numbers, and diagnosis and billing information.  Then they turn around and swipe IDs to buy medical equipment and pharmaceuticals that can be resold.

When your credit card is stolen, you know it right away because either your bank alerts you, you discover your card is missing, or mysterious charges show up on your statement.  By contrast, when a fraud perpetrator captures your Medicare number in concert with your personal information, they can milk it for an extended period of time without detection because you’re unlikely to discover that anything is amiss until Medicare discovers the fraudulent activity and contacts you to investigate. Read more ›

Tagged with: , , , ,
Posted in Healthcare

Improving Patient Safety through the Meaningful Use of Certified EHR Technology

Secured Document Delivery Blog I meaningful use I Armored Envoy

The benefits of EHR (electronic health records) are undeniable and significant.  According to a recent ONC (Office of the National Health Coordinator) presentation at Health IT Week, health providers that implement the principles of meaningful use – including computerized order entry and electronic documentation – report substantially fewer patient safety events and a 52% reduction in adverse pharmaceutical events.

A recent physician workflow survey found that nearly 70% of physicians reported that lab alerts and medication reminders were helpful tools to prevent accidental harm to patients with respect to their prescriptions, with 45% reporting that an EHR feature had alerted them to a potentially hazardous pharmaceutical error. For physicians using an EHR system, 51% reported a positive opinion on EHR alerts and 39% reported that electronic medical records improved clinical communication and care quality. Read more ›

Tagged with: , , , , , ,
Posted in Healthcare, HIPAA Compliance