The 8 Most Common HIPAA Violations

HIPAA violations have become increasingly common with the use of technology. Fines and penalties can be devasting to a practice, yet many organizations are not safeguarding against these types of...

by Ashley Young | November 2nd, 2018 | 0 Comments |

Russian VPNFilter: New Modules Create a Larger Threat

The Russian malware threat, Cytek originally reported on earlier this year, is bigger than originally thought. The discovery of seven new modules puts smart device users at a much greater...

by Ashley Young | October 1st, 2018 | 0 Comments |

Meeting HIPAA Documentation Requirements: Record Retention and Disposal

Why Document?  Proper documentation is critical when it comes to your business passing a HIPAA audit. Ensuring HIPAA compliance requires documentation, and both electronic and paper documents are protected by...

by Ashley Young | August 21st, 2018 | 0 Comments |

Smart Speakers: What You Need to Know

What They are: Smart speakers, or virtual assistants, are sophisticated artificial intelligence software. They are currently one of the most popular trends in technologies. The phenomenon started with virtual assistants...

by Ashley Young | July 24th, 2018 | 0 Comments |

Sextortion: New SCAM uses victims’ real password for blackmailing

Internet users need to be wary of a new phishing scam that is actually a sextortion scheme, which utilizes old passwords of users and blackmails them for watching pornography. The...

by Sam Munakl | July 17th, 2018 | 0 Comments |

FBI urging people to reboot routers due to malware threat

A new threat which targets a range of routers and network-attached storage (NAS) devices is capable of knocking out infected devices by rendering them unusable. FBI officials say any owner...

by Sam Munakl | May 29th, 2018 | 0 Comments |

Computer Ransoms !!

Ransomware is on a rampage, seizing control of personal computers and institution-wide networks and encrypting files to make them inaccessible until a ransom is paid to release them. In just...

by Sam Munakl | April 10th, 2018 | 0 Comments |

WHY YOUR ORGANIZATION NEEDS A CYBER SECURITY ASSESSMENT

A security assessment is performed to identify the current security posture of an information system or organization. The assessment provides recommendations for improvement, which allows the organization to a reach...

by Sam Munakl | April 10th, 2018 | 0 Comments |

8 Simple Steps to Protect Yourself Online

In today’s technology driven world it is not easy to secure your devices and information. Every day the news is filled with stories of massive data breaches, hacking attacks, and...

by Sam Munakl | April 10th, 2018 | 0 Comments |

Have you scheduled your REQUIRED risk analysis for 2017?

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities conduct a risk assessment of their healthcare organization. A risk assessment helps your organization ensure it...

by Sam Munakl | April 10th, 2018 | 0 Comments |

Microsoft Finally Says Goodbye to Windows Vista What You Need to Know as a Health Care Provider

The time has come: Microsoft has put the final nail in the coffin for Windows Vista. As detailed on its support site, Microsoft will no longer ship new security updates, non-security hotfixes,...

by Sam Munakl | April 10th, 2018 | 0 Comments |

Massive Cyber Attack and What You Need to Know

On Friday, May 12, 2017, the world was alarmed to discover that Cyber Crime had achieved a new record. In a widespread ransomware attack that hit organizations in more than...

by Sam Munakl | April 10th, 2018 | 2 Comments |

Equifax Data Breach: Steps You should Take to Protect Yourself

Credit monitoring agency Equifax revealed shocking news late Thursday: A data breach of the company’s servers from mid-May through July 2017 resulted in the theft of the personal information of...

by Sam Munakl | April 10th, 2018 | 0 Comments |

“If you want to keep living, Pay a ransom, or die.” Over 8,600 Vulnerabilities Found in Pacemakers

This could happen, as researchers have found thousands of vulnerabilities in Pacemakers that hackers could exploit. Millions of people that rely on pacemakers to keep their hearts beating are at...

by Sam Munakl | April 10th, 2018 | 0 Comments |

New Posts

#

The 8 Most Common HIPAA Violations

November 2nd, 2018
#

Russian VPNFilter: New Modules Create a Larger Threat

October 1st, 2018
#

Meeting HIPAA Documentation Requirements: Record Retention and Disposal

August 21st, 2018
#

Smart Speakers: What You Need to Know

July 24th, 2018