Blog

Largest Health Care Data Breach: Millions of Patients at Risk

Largest Health Care Data Breach: Millions of Patients at Risk

HomeHow one of the largest health care data breaches could affect you. A health care data breach is nothing new given how much hackers can make from the documents. We’re going to explain one particular data breach and what the…

Read more 

Business Associates Beware: More HIPAA Audits Are Coming

Business Associates Beware: More HIPAA Audits Are Coming

HomeThe Health and Human Services (HHS) Office of Civil Rights has begun phase 2 of its compliance audits. The 2016 audits will target covered entities and their business associates. For example, an IT support business working for a healthcare organization is…

Read more 

Ransomware Takes Aim on Small Business

Ransomware Takes Aim on Small Business

HomeRansomware has gotten much more intelligent in the last year, and it now represents one of the most damaging and widespread cybersecurity threats that businesses face on a daily basis. According to SophosLabs, ransomware is now so sophisticated it can…

Read more 

Are Voting Machines Secure?

Are Voting Machines Secure?

HomeCybersecurity and the Democratic Process With the DNC leak making headlines worldwide, serious concern about foreign powers interfering with the American democratic process is becoming part of the national discussion. Now, security experts believe that voting machines may become the…

Read more 

What Does the Workforce of the Future Look Like?

What Does the Workforce of the Future Look Like?

HomeIf the year was 1995 and you were to ask anyone, even a tech visionary, about what the workforce of the future would be capable of, they’d be hard pressed to arrive where we are now. Individuals in a wide…

Read more 

Does Your Marketing Plan Convert?

Does Your Marketing Plan Convert?

HomeHow to Turn Window Shoppers Into Buyers With Your Unique Selling Proposition When you first started your business, you likely thought about what made you different from your competition, and how your service or product would solve your customer’s problem.…

Read more 

How Hybrid Solutions Can Revolutionize Your Infrastructure

How Hybrid Solutions Can Revolutionize Your Infrastructure

HomeMany modern day businesses that seek to leverage modern technology to their advantage have a very important decision in front of them when it comes to the cloud. They can either choose to invest heavily in the public cloud due…

Read more 

Healthcare Organizations on the Hook

Healthcare Organizations on the Hook

HomeHow Your IT Provider’s Data Breach Puts Your Business Into the HIPAA/HITECH Spotlight In the wake of the almost-daily onslaught of news revealing yet another ransomware, malware attack or data breach, healthcare organizations are understandably concerned about the security of…

Read more 

Ransomware — Protecting Yourself From 4,000 Attacks per Day

Ransomware — Protecting Yourself From 4,000 Attacks per Day

HomeRansomware is malicious software that gets installed by cybercriminals who take over your system and hold it “hostage,” demanding ransom to give you back access to your critical data. This happens 4,000 times a day — and the pace is…

Read more 

Twin Threats: HIPAA Audits and Ransomware

Twin Threats: HIPAA Audits and Ransomware

HomeWith hackers hovering around to steal medical patients’ personal data and the likelihood of a HIPAA audit, these two factors can create the perfect storm for medical practices. The Office of Civil Rights (OCR) in the Department of Health and…

Read more