Search results for: “data”
-
6 Things to Look for in a Cybersecurity Partner
Cybersecurity is such an important part of today’s organization, impacting nearly every aspect of the company. So, it’s equally important to identify someone in the organization who can monitor cybersecurity…
-
The Importance of a Cybersecurity Training Plan
Your employees are your greatest vulnerability when it comes to protecting your sensitive data. You can put all the technical safeguards and protocols in place to protect the back-end of…
-
[CHECKLIST] How to Protect Yourself from a Ransomware Attack
Due to the vulnerability of human nature, completely protecting your organization from a ransomware attack is difficult to manage on your own. But, by taking the following precautions, you’ll be…
-
In Case of Emergency: What to Do in a Ransomware Attack?
In a recent study of 4,000 small- and medium-sized companies, Kaspersky noted that 49% of SMB respondents reported ransomware as one of the most serious threats facing their organization. The…
-
What Is Spear Phishing and Why Is It So Dangerous?
You’ve ordered a dozen times from Amazon, but one day you receive an email asking you to confirm the details of your recent order. The problem is that you haven’t…
-
HIMSS 2017 Cybersecurity Survey Reveals Prevention Statistics
Our constant dialogue with our clients proves a common IT worry: cybersecurity prevention and protection is a top priority for healthcare practices of all sizes and specialties. Recently published industry…
-
The Rise of Cyber-Insecurity
October is Cybersecurity Awareness Month. It’s a 14-year-old initiative established by the Department of Homeland Security to help raise the profile around various cybersecurity topics. Unfortunately, over the past few…
-
Cybersecurity Webinar Recap: New Attack Methods
Last year, Ginni Rometty, IBM’s chairman, president and CEO, said, “Cybercrime is the greatest threat to every company in the world.“ And she was right. CSO cites that during the next…
-
System Administrators: Fantastic Fixer of All Things Tech
If you’re reading this on your computer, smartphone or tablet, chances are your practice has an IT person that is responsible for making sure your device is securely connecting to…
-
The Evolution of the Public Cloud and Rise of the Hybrid Cloud
Nearly every American uses cloud services every day, in one way or another. Maybe you use the most common cloud platforms like Facebook and Instagram or a business-productivity application hosted…
-
Why SSAE 18 Should Matter to Your Practice
There is no shortage of security and compliance acronyms in today’s IT environment. You know the importance of HIPAA compliance within your practice, but for your service providers, there are…
-
Petya Ransomware Affecting Businesses Across the Globe
On Tuesday, June 27, a new wave of ransomware, known as Petya, started affecting Ukraine businesses with spillover to other countries including the USA. This new attack makes use of…