Cybersecurity
-
History Behind HITRUST
11/12/18Security rules surrounding the healthcare industry and its technology can seem overwhelmingly complicated and strict, but HITRUST (Health Information Trust Alliance) is becoming...
Read blog
-
We’re still a day away from Halloween, but business owners should be frightened by potential cyberattacks. During National Cyber Security Awareness Month, we...
Read blog
-
There are plenty of reasons cyber criminals target small and medium-sized businesses for cyberattacks. They often assume smaller organizations don’t have the financial...
Read blog
-
Today marks the first day of National Cyber Security Awareness Month (NCSAM), a collaborative effort that began in 2004 as part of a...
Read blog
-
Ransomware Becomes Top Cyber Threat
08/06/18It is easy for organizations to become numb to the threat of ransomware. Many choose to believe that their business is either too...
Read blog
-
Becoming data compliant and remaining that way is an ongoing concern for organizations and an ongoing headache for IT. IT Compliance initiatives were...
Read blog
-
As ransomware continues to gain notoriety, cybercriminals are looking for the quickest, most lucrative way to spread malware and make a buck. Their...
Read blog
-
Cyberattacks are still on the rise, a trend that unfortunately is going to continue to grow. Cyberattacks are pretty much unavoidable anymore, mindsets...
Read blog
-
What is HIPAA Compliance?
03/26/18HIPAA Compliance stands for the Health Insurance Portability and Accountability Act and is a U.S. federal law enacted in 1996 as an attempt at incremental healthcare reform....
Read blog
-
PCI DSS 3.2 : Are You Compliant?
03/19/18If you work for a company who takes card payments from customers over the phone, you are responsible for keeping that data as...
Read blog