Search results for: “vulnerability”
-
10 Key Takeaways from the 2019 HIMSS Cybersecurity Survey
Each year, HIMSS, the powerhouse in healthcare information systems, conducts a survey specifically around cybersecurity in healthcare organizations across the country. This year, the cybersecurity survey results are based on…
-
Recapping Our Top Specialized IT Posts of 2018
In 2018, we shared nearly 100 blog posts from our expert Netgainers in areas like Healthcare IT, Financial IT, Legal IT, Cloud Computing, Cybersecurity and Compliance, and Performance and Availability.…
-
[INFOGRAPHIC] Are Unsecure Passwords Putting Your Organization at Risk?
User error will arguably be your organization’s single largest security vulnerability. One area that is often overlooked is the management and oversight of passwords that can leave your organization vulnerable.…
-
The Top 2 Vulnerabilities Hackers Will Exploit to Steal Your Data
“During the next five years, cyber-crime might become the greatest threat to every person, place and thing in the world,” according to CSO, an online organization who provides news, analysis…
-
What is 2015 Edition CEHRT, Why it Matters for MIPS/MACRA and How Can I Prepare?
Healthcare technology is changing once again – and we want to get it on your IT roadmap! Here’s what you need to know about the upcoming changes to EHR version…
-
Our Netgain Story: CRSAL
Colon and Rectal Surgery Associates is a specialty practice that achieved their IT goals of lowering costs, improving network reliability and aligning IT goals with overall practice initiatives by moving…
-
Colon and Rectal Surgery Associates Client Story
Colon and Rectal Surgery Associates is a 25-provider practice that achieved their IT goals of lowering costs, improving network reliability and aligning IT goals with overall practice initiatives by moving…
-
FBI Issues Warning About VPNFilter Router Attacks
The FBI recently issues a warning about a malware attack specifically targeted at “consumer-grade” routers. The malware, called VPNFilter, is believed to have originated in Russia. The list of routers…
-
[INFOGRAPHIC] Understanding the True Cost of a Data Breach for Financial Firms
The financial services industry has been hit hard this year with data breaches. Perhaps the most notorious was the Equifax breach that the nation is still reeling over. More than…
-
2108 Planning Considerations
The kids are settled back in school, holiday décor is already out in stores, and the new year is just around the corner. For most businesses, this signals strategic planning…
-
[INFOGRAPHIC] Understanding the True Cost of a Data Breach for Healthcare
Doesn’t it feel like every time you go online, there’s another data breach, another practice has been hacked or another cyberattack is holding patient data hostage? Many administrators think it…
-
The Importance of a Cybersecurity Training Plan
Your employees are your greatest vulnerability when it comes to protecting your sensitive data. You can put all the technical safeguards and protocols in place to protect the back-end of…