Entries by admin

, ,

HIPAA Compliance 101

To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).

, , , ,

A bit of egg on my face.

Well, this is a little embarrassing… Last week one of our promoted products, password manager LastPass, announced they had suffered a breach through a third-party cloud storage solution. They disclosed an unknown actor gained access to certain customer information, but they didn’t elaborate. They did emphasize that no customer passwords were exposed since those are […]

, , , ,

The hole in your cybersecurity you may be overlooking

Unsecure Devices Most of you likely know that printers, scanners, and multifunction devices have been a weak link for cybersecurity for many network administrators. There are several reasons for this. First, like many networked medical devices, there was no built-in process for software updates, so when a security vulnerability was identified, few devices received patches. […]

, , , , ,

When cybersecurity training isn’t enough – what next?

Beyond Training – You Can’t Stop There. We’ve talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it’s not bulletproof. Two weeks ago Microsoft issued patches for over 85 security weaknesses across all of their Windows operating systems, including patches to close known […]

, , , , ,

Three ways to improve your cybersecurity

Three Steps You MUST Take Now. Cybersecurity professionals are sounding the alarm in agreement that we are about to experience another uptick in cybersecurity attacks. They cite numerous reasons for this coming storm. The most significant concern is the increased tensions we have with the usual cast of cyber-attacking state actors – Russia, China, North […]

, , , , Week 2 of Cyber awareness month!

At a recent discussion in Texas on cybersecurity in healthcare, technology experts were in agreement that cyber threats were increasing and getting more sophisticated. When we consider the options, we can boil them down to two – tighter network lockdowns, and more training.