The Healthcare Industry is Falling Behind on Data Protection

The Healthcare Industry is Falling Behind on Data Protection

HomeThe results of a recent Vanson Bourne Global Data Protection Index study may shock some in the healthcare industry: Only 10 percent of organizations doing business on the Web are “ahead of the curve” on data maturity and security readiness, according to the…

Read more 

Using Two-Factor Authentication to Address Workplace Cyber Threats

Using Two-Factor Authentication to Address Workplace Cyber Threats

HomeTwo-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most directly effective way to combat password hacking and the unauthorized access to company data, software, and devices. Password hacking is becoming more…

Read more 

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

HomeiPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be able to use your camera to spy on you. Although Apple released the patch in the…

Read more 

Switching To Windows 10?

Switching To Windows 10?

HomeHave You Made the Switch to Windows 10 Yet? The much-ballyhooed rollout of Windows 10 a little over a year ago was a welcome “fix” to many for the Windows 8 fiasco in 2012. The Windows 10 campaign represents Microsoft’s…

Read more 

Lessons Learned From The Athens Orthopedic Data Breach

Lessons Learned From The Athens Orthopedic Data Breach

HomeData breaches seem to have become a daily headline that causes readers to catch their breath each and every time. This knee-jerk reaction is for good reason. According to the Office of Civil Rights (OCR), in 2015 there were approximately 253…

Read more 

Is DevOps Automation of IT Security a Better Move?

Is DevOps Automation of IT Security a Better Move?

HomeAt a recent Security Roundtable that took place at Search IT Operations, one of the topics discussed was when a company should migrate their IT security to DevOps. Should it only be when IT departments are understaffed and have to resort to…

Read more 

Office 365 Users Beware: A Bold New Ransomware Threat Emerges

Office 365 Users Beware: A Bold New Ransomware Threat Emerges

HomeIf you had to make a list of the most pressing threats that Internet users face today, ransomware would undoubtedly be right at the top. Now, thanks to a massive zero-day attack by a particularly tricky group of hackers, Microsoft…

Read more 

Why IT Security for the Manufacturing Sector is So Vital

Why IT Security for the Manufacturing Sector is So Vital

HomeThe manufacturing sector of our economy at large presents many challenges for business owners who plan on keeping data regarding proprietary information on goods and production methods safe and secure. Consumer goods in particular are big business, but can also…

Read more 

Digital Transformation: 4 Ways SMBs Can Profit From It

Digital Transformation: 4 Ways SMBs Can Profit From It

HomeFour ways businesses can profit from digital transformation. Digital transformation allows SMBs to rub elbows with the large businesses they could one day become. However, many SMBs don’t have an honest game plan when it comes to taking advantage of…

Read more 

Largest Health Care Data Breach: Millions of Patients at Risk

Largest Health Care Data Breach: Millions of Patients at Risk

HomeHow one of the largest health care data breaches could affect you. A health care data breach is nothing new given how much hackers can make from the documents. We’re going to explain one particular data breach and what the…

Read more