-
Four Types of Email Cons Using Social Engineering
Social Engineering is the psychological manipulation of people in an effort to have them perform actions or divulge confidential information, and it is a major security issue. For centuries, con…
-
Network Security Improvement Advice for Any Network
The optimal method to assure your organization does not suffer due to a network attack is to prevent attacks from causing any damage. There are several ways to reduce the…
-
Ransomware Remains a Risk in 2016
2015 was rife with widespread propagation of ransomware and 2016 will be much the same. What is it? Ransomware is different than most historical malware. Instead of hacking into a…
-
How Can I Block CryptoLocker?
First off, a little back story. If you don’t know what CryptoLocker is, it is a very effective piece of malware. Specifically, it is a type of malware that holds…
-
Avoiding Malicious Websites
For those of us that have seen The Wizard of Oz, the Internet is like the field of poppies. Good and bad websites cannot be identified simply by looking at…
-
The Value of Support – What to look for when evaluating your service provider
Not all hosting companies have a good client support system. As a healthcare or financial provider you need to make sure that you not only look at their security, uptime and service…
-
6 Benefits of Moving to the Cloud (Part 2)
In Part I of The Benefits of Moving to the Cloud, we discussed how cost effective, scalable, and secure it is to implement a cloud solution for your IT needs.…
-
6 Benefits of Moving to the Cloud (Part 1)
There is no question that technological advances are being made at ever-increasing speeds. If you’re in the business of providing health or financial services that fact may make you a little…
-
The Top Risk Factors of using a Shared Cloud Environment for your Practice or Firm
There’s a big difference between using a shared cloud environment and using a private cloud for your healthcare or financial applications and data. If you’ve been under the impression that…
-
8 HIPAA-Related Questions To Ask A Potential Hosting Provider
HIPAA was created primarily to protect the confidentiality and security of healthcare information. As a physician’s practice, you are responsible for ensuring you use HIPAA compliant IT service vendors, particular…
-
4 Benefits of Using a Private Cloud Hosting Provider
The difference between a public and a private cloud is that a private structure will be used to solely accommodate your company data whereas a public system has infrastructure that…
-
Three Things to do in Response to the Sandworm Threat to Windows Security
Executive Summary: Earlier this week, Microsoft privately released a patch for a critical vulnerability affecting all modern versions of Windows. Without this patch, a malicious file can download and execute…