OnPage News – IoT Security

Internet of Things - IoT Security

OnPage Corporation is the Secure Messaging/Critical Alerts Leader: Learn More… IoT Security needs Scalable Solutions Article Courtesy of: TechCrunch The massive and unprecedented utility and opportunities provided by the Internet of Things (IoT) have been shadowed by grievous security and privacy tradeoffs, which have become a focal point of attention for the tech industry in the recent months. Discoveries like hacked baby monitors and remotely hijacked cars have given rise to new efforts and new initiatives, including the establishment of a foundation dedicated to defining standards and security practices for the IoT industry; a government-led solicitation project designed to encourage startups to address IoT security issues; and an educational book for children. While IoT can borrow many lessons and tactics from security protocols and technologies that have been tested in other domains, there are some glaring differences between IoT devices and traditional computing systems. The tech industry is taking strides to overcome the complexities these new […] Read more »

OnPage News – CyberIncidents

Nextgov - Cyberincidents

OnPage Corporation is the Secure Messaging/Critical Alerts Leader: Learn More…   SURVEY: MOST IT EXECS SAY THEIR COMPANIES CAN ONLY HANDLE ‘SIMPLE’ CYBERINCIDENTS Most corporate information security executives believe their teams can only handle “simple” incidents, like deactivating a lost phone or scanning a computer for a virus. This reflects a steady loss of confidence among corporate infosec pros in their ability to keep up with modern threats, according to a new global survey by ISACA, a non-profit group that certifies security professionals, and the RSA Conference, a series of events by security vendor RSA. The same survey, conducted two years ago, found that 87% of respondents were comfortable with their teams’ ability to deal with security incidents. That figure dropped to 73% in the latest survey, which polled 461 information security practitioners and managers: The survey also revealed the types of incidents that corporate infosec executives face on a daily basis. […] Read more »

OnPage Healthcare Technology


OnPage Healthcare Technology Solutions A secure, prioritized messaging solution that eliminates the need to carry a traditional pager. It is the middle of the night and the ER of a large hospital in Pennsylvania is witnessing record activity. A patient, in need of critical cardiac care, lies amid bustling nurses staring into the thunderstorm ripping through the city. Acting quickly, the hospital pages its senior cardiac surgeon who is engrossed in another task on a different floor. Regrettably, there is a sudden loss of coverage and the message is lost. Fortunately, the hospital had enough resources to avoid any grim consequence—but these situations can quickly go south, more often than not. What can be done to avoid such ‘close call’ scenarios altogether? Getting rid of pagers and embracing smartphones driven instant communication. “Real-time communication that is reliable is vital to healthcare,” states Judit Sharon, CEO, OnPage. While healthcare CIOs are immensely interested […] Read more »

OnPage News: Data Breaches

Data Breach - Secure Priority Alerts - OnPage

OnPage Corporation is the Secure Messaging/Critical Alerts Leader: Learn More… We Can’t Give Up on Preventing Data Breaches Article Courtesy of:  Security Week Despite a resolutely bullish rise in security spending — Gartner estimates the total reached a staggering $75 billion for 2015 — we continued to see record-high numbers in terms of data breaches and personal records lost. So what gives? Where is this money going and why isn’t it having a measurable impact? Much of the answer can be found in organizations’ belief that data breaches are inevitable. They’ve shifted the lion’s share of their new spending into identification and cleanup, and are now neither demanding nor expecting that their investments will prevent security incidents in the first place. Particularly on vulnerable endpoints — user systems mostly — this leads to a problem of compounding complexity. More machines are suspect, more traffic is designated for analysis, and infected […] Read more »

OnPage News: Security Attacks

Security Attacks

OnPage Corporation is the Secure Messaging/Critical Alerts Leader: Learn More… Security attacks? New defenses in 2016 escape compromise. Article Courtesy of:  TechTarget Worried that attackers may know your infrastructure better than you do? Cyberthreats are learning fast from defenses that detect them. New strategies focus on what happens next.   Arden Peterkin has little faith that antivirus software can be effective against today’s cyberthreats. In the past, the security architect deployed antivirus software on 80,000 endpoints in a large Georgia school district’s network to prevent a security attack. While the software reported “all clear,” a quick look at the device logs for the network confirmed infected systems were still communicating with known command-and-control sites. “The actual management console was showing that everything was great, but when we looked at the logs, they showed that the network was totally infected,” says Peterkin, a security contractor with Reamer & Associates. Today, Peterkin […] Read more »

OnPage News: IT Security

OnPage - Cybersecurity

OnPage Corporation is the Secure Messaging/Critical Alerts Leader: Learn More…   IT Security And Operations Staffs Often Work At Cross-Purposes   Article Courtesy of:  Forbes Hackers and state-sponsored cyber armies aren’t the only security threats large enterprises face today. Some of the biggest risks come from outdated and poorly synchronized internal procedures that thwart efforts to quickly defend against known threats. For example, 44% of executives in North America and Europe say security breaches occur even when vulnerabilities and their remediation have already been identified. The result: many enterprises face unnecessary risks to data loss and production downtime. One reason: while the joint efforts of security and IT operations ultimately deter- mine an enterprise’s security strength, the individual goals of these two groups are often misaligned, thanks to conflicting responsibilities and different metrics for evaluating and rewarding successful performance. The result is what industry analysts are calling a “SecOps gap,” […] Read more »

OnPage News – IoT Devices – Is Your Crock Pot Spying on You?

IoT - Smart Home Controls

Article Courtesy of: Computerworld Is the Government tapping into your IoT Devices & Spying on You? The U.S. spy chief admitted the government may use your “smart” internet-connected IoT devices to spy on you. A Harvard report no sooner debunked the FBI’s “Going Dark” argument than the U.S. intelligence chief admitted the government might use your “smart” internet-connected devices to spy on you. U.S. Director of National Intelligence James Clapper testified: “Smart” IoT devices incorporated into the electric grid, vehicles—including autonomous vehicles—and household appliances are improving efficiency, energy conservation, and convenience. However, security industry analysts have demonstrated that many of these new systems can threaten data privacy, data integrity, or continuity of services. In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials. Clapper’s prepared testimony about spying via IoT were included in the “Worldwide Threat […] Read more »

OnPage News: Data Center Cybersecurity

data center cybersecurity

The New 80-20 Rule for Data Center Cybersecurity Article Courtesy of:  SC Magazine – Written by: Alan S. Cohen @ Illumio . For much of the IT industry, 2014 was the year of the hack.   Reporters and analysts investigated and wrote incessantly about the seemingly hourly break-ins of corporate computer systems, culminating with the Sony incident associated with the release of “The Interview.” Undoubtedly, the cybersecurity challenge is going to result in an increasing focus and spend on security systems.   The question, however, is whether this will reduce the risk. Let’s start with the corporate data center, the Fort Knox of the enterprise, and how we guard its crown jewels.  Today, the vast bulk of security spend is on the network — firewalls, IDS/IPS, APT, monitoring, etc. — and it focuses almost exclusively on the internet perimeter. These investments account for over $10 billion in hardware/software spend alone (this […] Read more »

OnPage News: Cloud Security

OnPage Cloud Security

Cloud security market to be worth $12 billion by 2022, here’s why Article Courtesy of:  TechRepublic A recent market study by Transparency Market Research projects the cloud security market to grow to $11.8 billion by 2022.   Here are the factors that could fuel that growth. A recent study performed by Transparency Market Research (TMR) projects that the global cloud security market will grow to a valuation of $11.8 billion by the year 2022. To put that into perspective, in 2014 TMR put the value of that same market at $4.5 billion. The report, officially titled Cloud Security Market – Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014-2022, was officially released on Thursday. In the report, TMR predicts that the cloud security industry is due to experience a 12.8% compound annual growth rate (CAGR) between 2015 and 2022. There are a few different reasons behind the growth, as […] Read more »

OnPage News: Data Security Strategy

Data Security - Cyber Security

Why We’re So Vulnerable Article Courtesy of:  MIT Technology Review An expert in U.S. national cybersecurity research and policy says the next generation of technology must have data security built in from the very start. In an age of continuing electronic breaches and rising geopolitical tensions over cyber-espionage, the White House is working on a national cybersecurity strategy that’s expected in early 2016. Helping to draft that strategy is Greg Shannon. He was until recently chief scientist at Carnegie Mellon University’s Software Engineering Institute and is now on leave to serve as assistant director for cybersecurity strategy at the White House Office of Science and Technology Policy. In an interview with MIT Technology Review senior writer David Talbot, Shannon explained that dealing with today’s frequent breaches and espionage threats—which have affected federal agencies as well as businesses and individuals—requires fundamentally new approaches to creating all kinds of software. Fixing the infrastructure […] Read more »

OnPage Slashes Server Downtime

Servers Data Centers - OnPage Critical Alerts

OnPage Doesn’t Let Servers Down OnPage-ConnectWise integration assures that the IT alert was delivered and an issue was resolved. Server Downtime Incident Resoluton Solved: OnPage is unique – OnPage developed the industry’s only “Integrated Priority Round-Trip IT Alerting System” to ensure critical alerts reach the smartphone as a prominent page—with persistent/consistent delivery along with its “Alert-Until-Read” feature. OnPage rises above the clutter of SMS, Email or Phone calls – If you hear the OnPage sound you know it is urgent. OnPage provides seamless integration with major IT systems.   For example, OnPage for ConnectWise intelligent alerting works directly within the ConnectWise Service Desk Ticketing Console.  Alerts are automatically generated based upon the user-defined ticket severity. A real-time audit trail monitors that critical alerts reach the right person at the right time and are acted upon.  Exact time of delivery and recipient responses are fed back into the Service Desk Console and the corresponding […] Read more »

OnPage – Privacy & Security: HIPAA Compliance

OnPage - HIPAA Messaging Compliance

Best Practices For HIPAA Compliance & HIPAA Privacy Article Courtesy of:  Forbes Industries such as healthcare and financial services are special targets for data breaches and cyber criminals because, as bank robber Willie Sutton said, “that’s where the money is.” Every week, we read another story about cybersecurity breaches. The growing use of social media intensifies this risk, as users consider themselves part of a “tribe” and naively click on links from their “friends” and introduce malware into the organization. Or they inadvertently share personal information about patients or clients. Cybercriminals use also personal information shared on social media to trick users into giving up passwords, hacking accounts and worse. What can firms entrusted with client information do to protect client data as well as their own reputations?  As the discussion about privacy and security intensifies globally, I recently learned that the Health Insurance Portability and Accountability Act (HIPAA) was […] Read more »

OnPage: HIPAA Compliance Security 2015

OnPage - HIPAA Compliance 2015 -Health IT Security

Article Courtesy of:  HealthIT Security HIPAA Compliance, Data Breaches Are Top 2015 Stories As 2015 comes to an end, it can be beneficial to review the top issues that covered entities and their business associates encountered on a daily basis. Understanding HIPAA compliance will be critical for 2016, especially as the Office for Civil Rights (OCR) begins to conduct the next round of HIPAA audits. Moreover, learning from the healthcare data breaches of the past year will help organizations create stronger and more comprehensive data security plans. HealthITSecurity.com reviewed some of the top stories from 2015, highlighting key issues and what organizations should potentially look for in the new year. HIPAA compliance, violations Several OCR HIPAA settlements were finalized this past year, ranging in fines from thousands of dollars to millions of dollars. For example, Brighton, Massachusetts-based St. Elizabeth’s Medical Center (SEMC) agreed to $218,400 after potential HIPAA violations stemming from […] Read more »

Privacy & Security Breaches


In the healthcare industry, a patient’s privacy and security are held to the highest standard. Healthcare professionals and organizations must adhere to many rules & guidelines including the HIPAA Security Role, HITECH act and the Joint Commission.  Breaching these deep regulations can result in expensive fines and lack of patient confidentiality. Nevertheless, these breaches do occur more frequently than to be expected. One way these occur is due to nosy employees. In October of this year, Allina Health system in Minnesota notified more than 3,800 patients that one of its medical assistants had accessed their PHI improperly for more than three years. In this time frame she had accessed, patient’s names, DOB’s, clinical data, health insurance information and partial Social Security Numbers. They were able to seek out who was responsible for these breaches by following the audit trail of that patient’s record. Another way in which privacy & security breaches occur is due […] Read more »

MEMA Selects OnPage Secure Priority Messaging for Mitigating Disasters

To read the Entire Press Release Click here MEMA, The Massachusetts Emergency Management Agency has chosen the OnPage service from Onset Technology, the leader in mobile priority messaging, for their communication needs during response operations. MEMA, the state agency with primary responsibility for ensuring the state’s resilience to disasters added OnPage to its communication channels. MEMA provides the Commonwealth of Massachusetts valuable leadership during emergencies by coordinating with local, state and Federal governments to ensure a cohesive response. The Operations Division of MEMA maintains and operates the state Emergency Operations Center (EOC), monitoring emergencies statewide through the Communications Unit  24 hours a day, 7 days a week, and serves as the command and control center for the Commonwealth. OnPage’s priority messaging with its security features, traceability, and ability to communicate with different types of devices will enable MEMA’s Staff  to reliably communicate and share information during emergencies. OnPage integrates with […] Read more »