Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people.

CIA Network Exposed Through Insecure Communications System

Schneier on Security

Interesting story of a CIA intelligence network in China that was exposed partly because of a computer-security failure: Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time were supposed to be clearly separated.

DARPA Wants Research into Resilient Anonymous Communications

Schneier on Security

DARPA is funding research into resilient anonymous communications systems. anonymity darpa resilience

3 Steps to Overcoming Communication Barriers

Perficient Data & Analytics

Using these three tips will help ensure your communication quality is at peak performance. Key Questions for Effective Communication. To ensure you are communicating to your full potential, make sure your team has a firm “yes” to these questions.

Telenor boosts customer communications with OpenText

OpenText Information Management

Proposals and agreements are critical … The post Telenor boosts customer communications with OpenText appeared first on OpenText Blogs. Customer Experience Management Customer Communications Management (CCM) customer experience management customer story EMEA Exstream OpenText Elite OpenText ExstreamBrand consistency has a huge impact on brand awareness, which helps to drive understanding and loyalty among customers.

Deliver even more effective multichannel communications with Exstream 16.3

OpenText Information Management

Many people, of all ages, still like to get printed bills as a visual reminder to pay their various accounts, or to keep as … The post Deliver even more effective multichannel communications with Exstream 16.3 Customer Experience Management Customer Communications Customer Communications Management (CCM) Customer Experience customer experience management OpenText Exstream

Yet Another FBI Proposal for Insecure Communications

Schneier on Security

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the FBI.

Moving to All IP? Beware of how it will paralyze vital communications

OpenText Information Management

Beware of how it will paralyze vital communications appeared first on OpenText Blogs. Business Network Cloud Fax all ip cloud fax enterprise fax fax communications fax2mail IP fax secure fax swisscom

Nuance Communications Announces Healthcare Workflows

Document Imaging Report

March 5, 2018 – Nuance Communications, Inc. BURLINGTON, Mass. today announced a suite of workflows designed to increase productivity, enhance organizational efficiency and drive document security to aid in the management of information for healthcare organizations.

4 Steps to Effective Change Management Communications

Perficient Data & Analytics

Four steps to effective change management communications: . We sent out three “awareness” communications (“This is coming, and here’s why it’s great!”) Then we sent out a series of what we call “T-minus” communications (e.g., These communications were distributed using a distribution list related to the migration schedule for each wave, so that each user gets customized information before (and after) their specific go-live.

OpenText fax solutions remain a secure and trusted form of communication

OpenText Information Management

HP has … The post OpenText fax solutions remain a secure and trusted form of communication appeared first on OpenText Blogs. On August 13, 2018, Check Point Research published an article regarding a security flaw in HP all-in-one devices.

3 Reasons Change Management Isn’t Just Communication and Training

Perficient Data & Analytics

Change management is “just communication and training.” Just communication and training? I’ll grant you that change managers spend nearly 80 percent of our time on any given project performing activities related to communication and training. From communication artifact creation, reviews, edits, more reviews, and then distribution (and the same with training), it takes a lot of time and effort. I hear it all the time.

A 'Scarily Simple' Bug Put Millions of Cox Communications Customers at Risk

WIRED Threat Level

The most straightforward insecurities can sometimes be the riskiest. Security

EU Commission Releases Communication on Remaining Issues for GDPR Preparation

Hunton Privacy

On January 24, 2018, the European Commission issued a communication to the European Parliament and the Council (the “Communication”) on the direct application of the EU General Data Protection Regulation (“GDPR”). The second section of the Communication details actions taken by the European Commission and the Article 29 Working Party (“Working Party”) to date in preparing for the GDPR.

Enabling Effective Communication

Data Breach Today

Why building sound communication and documentation practices is critical to construction projects. In a previous article, we discussed three important areas of project management and ended by briefly discussing project communication. How do you prevent communication break downs?

Brazilian Banking Trojan Communicates Via Microsoft SQL Server

Threatpost

Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control (C&C) server. Malware Vulnerabilities banking trojan Microsoft SQL Server MnuBot Overlay Form RAT remote access Trojan social engineering Trojan

From DevOps to DevSecOps: Structuring Communication for Better Security

Dark Reading

A solid approach to change management can help prevent problems downstream

Court Sanctions Plaintiff After Jury Verdict for Failing to Disclose Third Party Communications: eDiscovery Case Law

eDiscovery Daily

In its response, plaintiff asserted that it did not violate the Court’s orders, did not violate the spirit of the Court’s orders, did not violate the letter or spirit of the discovery code and contended that the majority of the communications would fall under the work product doctrine.

Even with Bad Communication and Unfulfilled Discovery Obligations, Sanctions Still Not Granted: eDiscovery Case Law

eDiscovery Daily

After taking into consideration FRCP 26 and 37, as well as previous case law, Judge Mills ruled: “In some respects, it appears that the parties are having communication problems. eDiscovery Case Week concludes today!

Shortage of communication, analytical skills part of widening cybersecurity talent gap

Information Management Resources

Technical expertise is essential and in-demand for many positions in IT security, but ultimately may not be a good predictor of the value that a candidate might bring. Data security Cyber security Cyber attacks

Defendant Sanctioned for “Deliberately” Altering a Skype Communication: eDiscovery Case Law

eDiscovery Daily

The post Defendant Sanctioned for “Deliberately” Altering a Skype Communication: eDiscovery Case Law appeared first on CloudNine. In GoPro, Inc. 360Heros, Inc., 16-cv-01944-SI (N.D.

Nuance Communications’ Power PDF Now Available on Ingram Micro Cloud Marketplace

Document Imaging Report

January 9, 2018 – Nuance Communications, Inc. BURLINGTON, Mass.

Targeted social communication comes of age

Collaboration 2.0

With Facebook's first earnings call post IPO the digitally connected business world came of age, with hype to be replaced by alignment with the financial world's demand for demonstrated effectiveness. Cloud Collaboration

Broadcast or communicate? | ZDNet

Collaboration 2.0

Broadcast or communicate? A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere. Communication, Collaboration and Coordination.

Glitch in the Matrix – The Vital Role of Communication Between All Stakeholders in eDiscovery: eDiscovery Best Practices

eDiscovery Daily

Jim’s post below highlights the importance of communications between all stakeholders in the discovery process. Here’s an example of what can happen when communications break down. For more information on how CloudNine manages communications for our clients, contact us at info@ediscovery.co. So this is why it’s important to create communication protocols surrounding technology changes ahead of time, so that things like this aren’t missed.

Nuance Communications Recognized as Ingram Micro Emerging Vendor of the Year in the United States

Document Imaging Report

Nuance Ingram Micro Emerging Partner. Tweet. Press Releases MPS channel Capture

7 habits of highly overrated people - managing over communicators and self promoters

Collaboration 2.0

Stopping smart self promoters from dominating collaborative processes is far more important than most realize - overcommunicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.0

Comics for Consumer Communication

ChiefTech

The rising popularity of the comic as an internal communication device for designers has increased our ability to engage our stakeholders as we build interfaces. In situations where traditional printed matter is a barrier, graphical methods can be used very effectively to communicate with audiences. Yet, social service agencies looking to provide services to hard-to-reach groups like immigrants, cultural minorities, and the poor have taken pride in innovative outreach methods.

Tumblr Privacy Bug Could Have Exposed Sensitive Account Data

Threatpost

Hacks Web Security AOL bug bounty exposed data Facebook Google+ Oath Tumblr Verizon Communication vulnerabilityTumblr stressed that there is no evidence the security bug was being abused or that unprotected account data was accessed.

Are you there? The paradox of 'real time' communication

Collaboration 2.0

Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications

CFO

InfoGovNuggets

Governance Communications Controls Third parties Internal controls Compliance Duty Employees Accuracy Communicate Compliance (General “Ex-Salix Official to Pay Fine,” The Wall Street Journal , September 29, 2018 B10. A company’s CFO understated the company’s inventories held by wholesalers; fined $1 million. “Under-reporting,” also known in lay circles as lying, is generally not a good thing, especially for a CFO.

Sunk ship

InfoGovNuggets

Communicate Communications Compliance Compliance (General) Duty Employees Governance Information Management“SEC Sues to Oust Musk From Tesla Over Tweets,” The Wall Street Journal , September 28, 2018 A1. The SEC sued to remove Elon Musk as the CEO of Tesla, after Mr. Musk tweeted about funding for taking the company private. See also [link]. So, if the CEO doesn’t follow the rules, how much do the shareholders get hurt? Ten percent (or $5 billion).

GAO: Patient access to medical records remains a challenge

Information Management Resources

Patient engagement Patient-physician communication Patient data EHRAdoption of EHRs has resulted in a more complex environment as providers respond to patient requests.

Cyberattacks on the rise? Time for a client lunch

Information Management Resources

Cyber attacks Cyber security Community banking Client communications Community banks FBI GeorgiaOne community bank decided it can build closer relationships with business clients by hosting events to help them learn how to fortify their cyberdefenses.

Creating remarkable customer experiences

OpenText Information Management

What makes an interaction, a communication, a purchase, or any other kind of customer experience we have in our daily lives, a remarkable one? Customer Experience Management Communications Customer Experience customer experience management Customer Loyalty Customer Service Marketing

What is your brand?

InfoGovNuggets

Accuracy Communicate Communications Controls Corporation Data quality Duty Governance Internal controls Management“Hundreds of Cryptocurrencies Show Hallmarks of Fraud,” The Wall Street Journal , May 18, 2018 A1. Plagiarism, promises of future returns, and fake executives found in offering materials for cryptocurrency companies. What can investors expect if they invest in these companies?

EFAIL Opens Up Encrypted Email to Prying Eyes

Threatpost

The flaws threaten to expose corporate communications in Outlook as well as the messages of at-risk users like political dissidents. Cryptography Privacy Vulnerabilities dissidents efail Encryption mitigations OpenPGP Outlook s/mime Secure email sensitive communications vulnerabilities

Sophisticated 3D modeling plays growing role in healthcare

Information Management Resources

Medical imaging Patient-physician communication HITVendor partnerships speed production of models that help visualize procedures, engage patients.

Puget Sound Energy achieves award-winning content management and customer engagement

OpenText Information Management

What happens when you successfully modernize customer communications and deliver a centralized SAP-integrated content management solution? Enterprise Content Management customer communications management customer story customer video Data Archiving Document Presentment Extended ECM PSE SAPYou create a superior customer experience, improve business productivity, and win an OpenText™ Elite™ Award for SAP Integration Excellence!

Salesforce Solutions at Enterprise World

OpenText Information Management

Customer Experience Management Digital Transformation Enterprise Content Management Enterprise World ccm Customer Communications Management (CCM) enterprise world 2018 Extended ECM Salesforce

Blog 52

Hiding the ball

InfoGovNuggets

IT Security Privacy Information Governance Communications Duty of Care Controls Internal controls Culture Compliance Duty Corporation To report Compliance (General “Google Hid Data Breach for Months,” The Wall Street Journal , October 9, 2018 A1. Alphabet hid or failed to disclose the breach of “hundreds of thousands of users” for six months, to avoid “regulatory scrutiny and … reputational damage.” ” Data accessed between 2011 and 2018.

Hiding another ball

InfoGovNuggets

Communications Compliance Compliance (General) Controls Corporation Culture Directors Duty Duty of Care Employees Governance Information Internal controls Investor relations Oversight Protect assets Supervision To report“HSBC to Pay $765 Million in U.S. Pact,” The Wall Street Journal , October 10, 2018 B12. Bank hid the risks of defective mortgages for at least 2 years. Sold mortgaged-back securities in the meantime. “Wells Fargo … [paid] $2.09

Risk 28

Smart Dust – Personal Clouds

Perficient Data & Analytics

Peanuts Wiki. The author could not resist the analogy here. In my recent research on emerging technology for my client I came across the subject of “Smart Dust.” ” I had reviewed the technology one time before but put it in the “10-year plus” category.

Cloud 52