Data Security

EDI Best Practices for a New Year

Toasting our way into 2024, the world of business continues to evolve, and staying ahead of the curve is crucial for success. Electronic Data Interchange (EDI) and B2B integration remains a cornerstone of efficient and secure business communication, enabling seamless exchange of information between trading partners. In this blog article,…
READ

Ace the EDI Application Upgrade Process

Updated July 7, 2023 A Little Planning Goes a Long Way Photo appears courtesy of brownpau. How many times have you scheduled an EDI application upgrade, only to find out at the last minute that you haven’t met all of the requirements or that users weren’t informed that the system…
READ

What is HIPAA? Complying and Reducing the Burden

Reprinted with permission from Liaison Technologies.  Written by Hmong Vang, Chief Trust Officer for Liaison Technologies. The Health Insurance Portability and Accountability Act (HIPAA) was an amendment to the Internal Revenue Code of 1986.  And while it was enacted primarily to ensure portability and continuity of health insurance coverage and improving the exchange…
READ

SHA-1 vs. SHA-2 Digital Certificates – What’s All the Fuss About?

Photo appears courtesy of F Delventhal. Many of you probably know about the new requirements coming regarding SHA2 digital certificates.  Before we discuss that, let’s first look at SHA-1.  What is SHA-1?  According to Wikipedia, in cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security…
READ

Five Questions to Ask Your EDI Software Vendor

Photo appears courtesy of Susan.  Shopping for data integration solutions is a long, sometimes overwhelming process.  Before you start looking at demos and getting proposals, it’s important to sit down and decide what you need for your most basic integration requirements as well as your future requirements.  In other words, the…
READ