Search results for: “vulnerability”
-
[CHECKLIST] How to Protect Yourself from a Ransomware Attack
Due to the vulnerability of human nature, completely protecting your organization from a ransomware attack is difficult to manage on your own. But, by taking the following precautions, you’ll be…
-
In Case of Emergency: What to Do in a Ransomware Attack?
In a recent study of 4,000 small- and medium-sized companies, Kaspersky noted that 49% of SMB respondents reported ransomware as one of the most serious threats facing their organization. The…
-
HIMSS 2017 Cybersecurity Survey Reveals Prevention Statistics
Our constant dialogue with our clients proves a common IT worry: cybersecurity prevention and protection is a top priority for healthcare practices of all sizes and specialties. Recently published industry…
-
Petya Ransomware Affecting Businesses Across the Globe
On Tuesday, June 27, a new wave of ransomware, known as Petya, started affecting Ukraine businesses with spillover to other countries including the USA. This new attack makes use of…
-
Social Engineering: How to Protect Your Practice from an Attack
Remember the great con-artist, Gregor MacGregor, known as the “king of all con-men?” He convinced people to invest in an entirely fictitious country that he had conjured up. More recently,…
-
What’s the Lifespan of Hardware and Software?
Hardware and software refreshes are often viewed as expensive capital investments that never last long enough. When properly planned for, though, refreshes can enable your practice’s growth by boosting productivity…
-
4 IT Expenses Healthcare Entities Plan to Increase for 2017
It’s that time of year again – budgeting. Some administrators dread budgeting, while others love planning and dreaming of next year’s possibilities. No matter the group you fall in to,…
-
Do You Have These 5 Common HIPAA Compliance Issues Covered?
HIPAA audits are underway, and every Covered Entity and Business Associate has their name in the hat. You never know when you will be audited. It is best to be…
-
Website Passwords Can Give Easy Access to ePHI
We all login to many websites. Online banking, social media, and shopping and news sites are just a few examples. Chances are we even created accounts on now long-forgotten websites.…
-
8 HIPAA-Related Questions To Ask A Potential Hosting Provider
HIPAA was created primarily to protect the confidentiality and security of healthcare information. As a physician’s practice, you are responsible for ensuring you use HIPAA compliant IT service vendors, particular…
-
Three Things to do in Response to the Sandworm Threat to Windows Security
Executive Summary: Earlier this week, Microsoft privately released a patch for a critical vulnerability affecting all modern versions of Windows. Without this patch, a malicious file can download and execute…