855-447-2210 [email protected]

Blogs

Stay updated on the latest news, stories and tips on IT security and compliance techniques on our blog. Subscribe to get instant updates directly to your inbox.

Sign up For our blog!

Get updates on our newest blog posts

Email Scams, Email Scams……Broken Record Alert!

We seem to hear new warnings about ransomware or phishing threats every day. It is starting to feel like a broken record and people are tuned out. The reality is email continues to be the weapon of choice for cybercriminals seeking to steal data or money from...

Cybersecurity Vigilance

We’d like to think everyone’s attention is on how to avoid catching COVID-19 but that is not the case.  Not only is COVID-19 spreading at a rapid pace, so is malware that is leveraging the pandemic for financial gains.  We recommend communicating to employees to treat...

5 Cybersecurity Tips for Business Travelers

While you are focused on getting to the next meeting or seeing the next client, realize cyber criminals could be focused on you. Plan now to stay safe on your next trip. If your job is to facilitate travel (logistically, technically, or managerially) for your...

Cybersecurity Training in Healthcare Offers Disappointing Stats

A recent article at HealthITSecurity.com discussed some disappointing stats regarding cybersecurity training in Healthcare. The article “24% of US Health Employees Never Received Cybersecurity Training” highlighted an alarming number of workers in Healthcare are...

7 Steps for Building HIPAA Compliance

How can your company stay HIPAA compliant? Follow these 7 steps to ensure that you are following the necessary procedures to protect your organization’s reputation and data. Are you missing a step or do you need help building compliance? We can help you conduct...

After a HIPAA Breach: Documenting and Reporting

In the first two installments of this series discussing the next steps HIPAA regulated organizations must take after a security breach. So far, we have looked at: Who is Required to Report a Breach? When Do You Need to Report a Breach? Next, let’s discuss what is to...

Why You Should Make Locking Your Computer a Habit

Many security incidents or even breaches are not caused by sophisticated, malicious hackers but by innocent oversight, carelessness, or lack of understanding of security processes and company policies. Ultimately, the worst IT security incident to deal with...

How Much Will a Healthcare Data Breach Cost Your Company?

Healthcare data breaches have a large impact on the companies that are attacked. Not only do they cause a financial crisis and upset, but also they also affect the reputation your company has built. See the statistics of healthcare data breach below and learn how you...

4 Elements of a Strong Security Policy

An effective security management program relies on various moving parts in a concerted effort to build a formidable organizational security posture.  At the foundation of this comprehensive program must be strong documented security policies that reflect the risk...

Ensure HIPAA Compliance by Updating Malware Protection Software

The easiest way to avoid being the victim of a computer virus or malware that can steal or hold hostage your valuable information is to not make yourself vulnerable in the first place. Just like home security, thieves will look for the unlocked door or the...

Cybersecurity Vigilance

We’d like to think everyone’s attention is on how to avoid catching COVID-19 but that is not the case.  Not only is COVID-19 spreading at a rapid pace, so is malware that is leveraging the pandemic...

read more

7 Steps for Building HIPAA Compliance

How can your company stay HIPAA compliant? Follow these 7 steps to ensure that you are following the necessary procedures to protect your organization’s reputation and data. Are you missing a step...

read more

4 Elements of a Strong Security Policy

An effective security management program relies on various moving parts in a concerted effort to build a formidable organizational security posture.  At the foundation of this comprehensive...

read more