Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people.

iPhone Apps Surreptitiously Communicated with Unknown Servers

Schneier on Security

Long news article ( alternate source ) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge.

Fax & Omnichannel Communications Learn Path at Enterprise World

OpenText Information Management

The Fax & Omnichannel Communications Learn Path delivers practical training, tools … The post Fax & Omnichannel Communications Learn Path at Enterprise World appeared first on OpenText Blogs. Business Network Enterprise World Fax Enterprise World 2019 fax Fax & Omnichannel Communications Learn Path learn path learn paths RightFax

Consolidating customer communications platforms at NAV with OpenText Exstream

OpenText Information Management

Every year the Norwegian Labour and Welfare Administration (NAV) sends out more than 20 million items of communication to over 3 million citizens in Norway.

Cracking Down on Criminals' Use of Encrypted Communications

Data Breach Today

An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management

New Miori botnet has a unique protocol for C2 communication

Security Affairs

A new variant of the implements a unique protocol to communicate with Command and Control infrastructure. A new variant of the Miori botnet uses a unique protocol to communicate with C&C infrastructure, it implements a protection mechanism to access the login panel.

3 Steps to Overcoming Communication Barriers

Perficient Data & Analytics

Using these three tips will help ensure your communication quality is at peak performance. Key Questions for Effective Communication. To ensure you are communicating to your full potential, make sure your team has a firm “yes” to these questions.

Ignite your career with multimedia communication skills

DXC Technology

Career Digital Transformation Robotics Workplace adaptability AI automation communications skills IT career IT jobs multimedia podcasts videoIn a workplace where automation and artificial intelligence (AI) increasingly are taking over tasks traditionally performed by humans, it is imperative that employees build “competencies in areas that machines will be unlikely to tackle effectively,” as the World Economic Forum advises.

DARPA Wants Research into Resilient Anonymous Communications

Schneier on Security

DARPA is funding research into resilient anonymous communications systems. anonymity darpa resilience

CIA Network Exposed Through Insecure Communications System

Schneier on Security

Interesting story of a CIA intelligence network in China that was exposed partly because of a computer-security failure: Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time were supposed to be clearly separated.

ICS-CERT warns of several flaws in the GE Communicator software

Security Affairs

ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs. ICS-CERT is warning of five flaws affecting the GE Communicator software, including privilege escalation issues and hardcoded credentials.

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

The Platinum cyber espionage group uses steganographic technique to hide communications with the Command and Control Servers (C&C). The post Platinum APT and leverages steganography to hide C2 communications appeared first on Security Affairs.

French Government App Shows Difficulties with Secure Communications

Adam Levin

A messaging app released by the French government to secure internal communications has gotten off to a troubled start. The post French Government App Shows Difficulties with Secure Communications appeared first on Adam Levin.

Poor Communications Slowing DevOps Shift

Dark Reading

Existing functional silos are standing in the way of building a DevOps culture

Telenor boosts customer communications with OpenText

OpenText Information Management

Proposals and agreements are critical … The post Telenor boosts customer communications with OpenText appeared first on OpenText Blogs. Customer Experience Management Customer Communications Management (CCM) customer experience management customer story EMEA Exstream OpenText Elite OpenText ExstreamBrand consistency has a huge impact on brand awareness, which helps to drive understanding and loyalty among customers.

Deliver even more effective multichannel communications with Exstream 16.3

OpenText Information Management

Many people, of all ages, still like to get printed bills as a visual reminder to pay their various accounts, or to keep as … The post Deliver even more effective multichannel communications with Exstream 16.3 Customer Experience Management Customer Communications Customer Communications Management (CCM) Customer Experience customer experience management OpenText Exstream

How Media & Communication Can Leverage IP Assets to Stay Competitive


We’ve all witnessed the global media and communication industry go through a huge transformation over the last few years. Making sense of this data and managing it intelligently is perhaps the biggest challenge that media and communication companies face today. For media and communication companies, a cost effective and robust data-driven solution like Title 360 helps manage their revenue generating IP assets with a master repository for all titles complete with all the attributes.

Yet Another FBI Proposal for Insecure Communications

Schneier on Security

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the FBI.

Zuckerberg says Facebook to focus on private communication

Information Management Resources

The CEO said the future of his company’s product development will be focused on private, ephemeral and encrypted communication. Social media Customer data Facebook

Nuance Communications Announces Healthcare Workflows

Document Imaging Report

March 5, 2018 – Nuance Communications, Inc. BURLINGTON, Mass. today announced a suite of workflows designed to increase productivity, enhance organizational efficiency and drive document security to aid in the management of information for healthcare organizations.

7 Tips For Communicating With the Board

Dark Reading

The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk

How the Best File Sharing Platform Improves Business Communication


Effective business communication requires a platform, personnel, and a purpose. But today’s technology has enabled business communication to evolve past physical world limitations and into the digital space. The introduction of email in the 1990s changed how we communicate forever.

EUROPE: e-Privacy Regulation – changes regarding electronic communications and digital marketing

DLA Piper Privacy Matters

Since the European Commission unveiled a proposal for an e-Privacy Regulation in January 2017, this new piece of legislation, aiming to adapt rules on electronic communications and cookies, has undergone many iterations. On 26 July 2019, at the level of the Council, the Finnish government has issued a revised (Council) proposal for the e-Privacy Regulation with some amendments concerning electronic communication content, data & metadata, and further processing of metadata.

Google dorks were the root cause of a catastrophic compromise of CIA’s communications

Security Affairs

Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens of spies. The alleged hack of the communications network used by CIA agents allowed Iranian intelligence to identify and kill at least 30 spies. News the security breach has happened in 2009, the Iranian intelligence infiltrated a series of websites used by the CIA to communicate with agents worldwide, including Iran and China.

Moving to All IP? Beware of how it will paralyze vital communications

OpenText Information Management

Beware of how it will paralyze vital communications appeared first on OpenText Blogs. Business Network Cloud Fax all ip cloud fax enterprise fax fax communications fax2mail IP fax secure fax swisscom

Communicating About Cybersecurity in Plain English

Lenny Zeltser

When cybersecurity professionals communicate with regular, non-technical people about IT and security, they often use language that virtually guarantees that the message will be ignored or misunderstood.

Communication service providers must transform support systems to realize 5G’s true potential

DXC Technology

Until now, each transition to the next generation of wireless networks, most recently 3G to 4G, has been incremental and relatively seamless. But the jump from 4G networks to 5G is expected to be monumental and fundamentally disruptive. 5G is more than just a faster, lower-latency version of 4G; it represents the first generation wireless […]. Mobility Networks Technology, Media & Entertainment, Telecommunications 5G CSPs Telecom

Memes on Twitter Used to Communicate With Malware

Dark Reading

Steganography via tweet images gave attackers a way to pass on malicious instructions to Trojan, researchers say

4 Steps to Effective Change Management Communications

Perficient Data & Analytics

Four steps to effective change management communications: . We sent out three “awareness” communications (“This is coming, and here’s why it’s great!”) Then we sent out a series of what we call “T-minus” communications (e.g., These communications were distributed using a distribution list related to the migration schedule for each wave, so that each user gets customized information before (and after) their specific go-live.

Everteam Awards Jeraisy Computer & Communication Services Best Partner of the Year


said corporates from Jeraisy Computer and Communication Services. The post Everteam Awards Jeraisy Computer & Communication Services Best Partner of the Year appeared first on EVERTEAM.

Who Owns Your Wireless Service? Crooks Do.

Krebs on Security

“What we’ve seen is the Federal Communications Commission (FCC) is well aware of this ongoing behavior about location data sales,” Mackey said. Incessantly annoying and fraudulent robocalls.

3 Reasons Change Management Isn’t Just Communication and Training

Perficient Data & Analytics

Change management is “just communication and training.” Just communication and training? I’ll grant you that change managers spend nearly 80 percent of our time on any given project performing activities related to communication and training. From communication artifact creation, reviews, edits, more reviews, and then distribution (and the same with training), it takes a lot of time and effort. I hear it all the time.

New HHS Checklist Helps First Responders Ensure Language Access and Effective Communication During Emergencies

IG Guru

The post New HHS Checklist Helps First Responders Ensure Language Access and Effective Communication During Emergencies appeared first on IG GURU. Dec 11, 2018 Washington, DC – The U.S.

Enabling Effective Communication

Data Breach Today

Why building sound communication and documentation practices is critical to construction projects. In a previous article, we discussed three important areas of project management and ended by briefly discussing project communication. How do you prevent communication break downs?

OpenText fax solutions remain a secure and trusted form of communication

OpenText Information Management

HP has … The post OpenText fax solutions remain a secure and trusted form of communication appeared first on OpenText Blogs. On August 13, 2018, Check Point Research published an article regarding a security flaw in HP all-in-one devices.

Brazilian Banking Trojan Communicates Via Microsoft SQL Server


Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control (C&C) server. Malware Vulnerabilities banking trojan Microsoft SQL Server MnuBot Overlay Form RAT remote access Trojan social engineering Trojan

Shortage of communication, analytical skills part of widening cybersecurity talent gap

Information Management Resources

Technical expertise is essential and in-demand for many positions in IT security, but ultimately may not be a good predictor of the value that a candidate might bring. Data security Cyber security Cyber attacks

Nuance Communications’ Power PDF Now Available on Ingram Micro Cloud Marketplace

Document Imaging Report

January 9, 2018 – Nuance Communications, Inc. BURLINGTON, Mass.

8 Lessons on Compliance Collaboration, Communication, and Effectiveness from our Webinar with Tom Fox and Louis Sapirman

Hanzo Learning Center

The marketing and communications departments in an organization are often among the most overlooked internal groups by compliance teams, according to Tom Fox, who views them as both a potentially valuable partner, and a source of risks that may not be accounted for.

From DevOps to DevSecOps: Structuring Communication for Better Security

Dark Reading

A solid approach to change management can help prevent problems downstream