Compliance

For centuries, the laying on of hands, or the “human-touch” has symbolized the essence of the doctor-patient relationship. The COVID-19 pandemic is disrupting this age-old tradition by accelerating the digital transformation of the healthcare delivery model for medical workers globally. The human-touch is now transforming to an increasingly digital-touch, enabled by secure telehealth solutions. This …

Changing the Human Touch to a Digital Touch – how COVID-19 Accelerates the Need to Secure Telehealth Read More »

I’m sure you are aware of the worldwide pandemic that is gripping our lives and changing how children learn. It is an incredibly difficult time for educators who are being asked to offer new and improved ways of learning remotely. Securing the new distance learning environment and the privacy of students has become a catch-up …

Guide to Data Regulation Compliance for Distance Learning in K-12 Read More »

As per every new year, we all start with resolutions of what we will change for the better, for fellow IoT rock stars, security needs to be top of the list. With the new decade fresh in our minds, IoT security is already making news headlines. “Hacker leaks passwords for more than 500,000 servers, routers, …

Do I Really Need a Private Network for IoT? Read More »

How does the abolishment of EU roaming charges affect business? It’s great news that the EU have agree the parameters around roaming charges being abolished across Europe from June 2017. But CFOs and finance departments still need to be aware of a few things. Roaming is not the only source of overages. Staff can still rack …

Yes to abolishing EU roaming charges Read More »

Following on from our recent look at IoT security and the technical fallout from compromised ‘things’, it’s clear the issue raises many questions. For example: what are the legal implications to having your internet of things’ devices hacked? Could the owner and producer of a connected IP camera be liable for damages caused by a …

It’s your round: who pays for an insecure Internet of Things? Read More »