WELCOME TO OUR BLOG

Teach Your Employees How to Avoid Phishing

Teach Your Employees How to Avoid Phishing

Teach your Employees how to Avoid Phishing • Check for accurate spelling in the sender’s email address. Move the cursor over the address. If the pop-up address is different, don’t open it. • Also move the cursor over links before clicking on them. This will reveal the...

Bring Your Own Device Threats Are Often Overlooked

Bring Your Own Device Threats Are Often Overlooked

Most employees not think much about cybersecurity at work. They are likely unaware that the smartphone, laptop, tablet or even wearable device (like a fitness tracker) they bring to the office could be opening a digital door to their employer's network and...

What Happens if I Lose my Data?

What Happens if I Lose my Data?

What Happens if I Lose My Data? Your data is the life blood of your company.  What happens if you can longer access your Point of Sales information?  Your bills and invoices? Payroll information? The aftermath of data loss can be catastrophic. Some...

What To Do After a CyberAttack

What To Do After a CyberAttack

According to  CyberArk Global Advanced Threat Landscape Report 2018, almost half of all organizations do not make substantial changes to their security strategy even after a cyber attack. The report suggests that many businesses feel hopeless against the...

$31,000 fine for missing BAA

$31,000 fine for missing BAA

According to Healthcare IT News, Center for Children's Digestive Health shared PHI with FileFax, but didn't have a BAA in place when it shared patient information with a business partner. "The Center for Children’s Digestive Health, a small, for-profit pediatric...

HIPAA Compliance — Notes from the Field

HIPAA Compliance — Notes from the Field

Advances in security technology and increased governmental cybersecurity initiatives have not been enough. Attackers will not abandon their pursuit of unprotected patient data and they are getting more sophisticated every day. According to the Identity Theft Resource...

Pin It on Pinterest

Share This