-
4 Tips to Improve Your Mobile Security
Are mobile devices putting your practice at risk? According to the 2015 HIMSS Mobile Technology Survey, nearly 90 percent of healthcare provider employees are utilizing mobile devices as part of…
-
Ransomware: How to Protect Your Data from Being Held for Ransom
Ransomware attacks are real and they are on the rise – affecting organizations of every shape and size. Ransomware, a malicious type of software, indiscriminately encrypts a company’s files, and…
-
Spring Cleaning: Don’t Forget Your Technology!
Every year when spring arrives, people celebrate the end of winter and begin to emerge from their hibernation. It is during this season that summer preparations begin. Winter things are…
-
Four Types of Email Cons Using Social Engineering
Social Engineering is the psychological manipulation of people in an effort to have them perform actions or divulge confidential information, and it is a major security issue. For centuries, con…
-
Network Security Improvement Advice for Any Network
The optimal method to assure your organization does not suffer due to a network attack is to prevent attacks from causing any damage. There are several ways to reduce the…
-
Ransomware Remains a Risk in 2016
2015 was rife with widespread propagation of ransomware and 2016 will be much the same. What is it? Ransomware is different than most historical malware. Instead of hacking into a…
-
Website Passwords Can Give Easy Access to ePHI
We all login to many websites. Online banking, social media, and shopping and news sites are just a few examples. Chances are we even created accounts on now long-forgotten websites.…
-
Netgain Passes 2015 SSAE 16 Audit
Each year, Netgain goes through exhaustive security audits to ensure our physical environment as well as our processes and procedures are in line with what’s needed to protect our clients’…
-
How Can I Block CryptoLocker?
First off, a little back story. If you don’t know what CryptoLocker is, it is a very effective piece of malware. Specifically, it is a type of malware that holds…
-
Avoiding Malicious Websites
For those of us that have seen The Wizard of Oz, the Internet is like the field of poppies. Good and bad websites cannot be identified simply by looking at…
-
Addressing Healthcare Mobile Security: 4 Things You Need to Know
There are very big concerns about IT Security in this age of mobile healthcare technology. In order to abide by federal regulations, healthcare personnel and facilities must safeguard patients’ records…
-
HIPAA Compliance Services: 4 Things Your IT Service Provider Should Be Offering
Keeping up with HIPAA and healthcare IT regulations can be a full-time job, if it is done in-house. However, most companies can outsource the liabilities associated with non-compliance by hiring…