How to Tell if You Were Sent a Phishing Email
Millions of people wake up every morning, turn off their alarms, and immediately check social media, emails, or any application on their mobile devices. This has grown to be a regular routine for many. A growing number of hackers are taking advantage of these multitudes – most of whom are still half asleep – by... Continue reading
Managed Security Services – Can you afford NOT to have them?
Network uptime – your patients depend on it. As cloud-based technology increasingly becomes the preferred means by which companies conduct business, not having the right services in place to protect against unexpected downtimes – whether from hardware/software failures or security compromises – can spell disaster. As the recent Amazon S3 outage proves, catastrophic infrastructure failures... Continue readingMalware Threatening Healthcare Organizations
Clear Procedures are Needed to Protect against Malicious software. That’s a start. Here’s what you also need: Trained users of (the latest) malicious software protection tools, who’ve become skilled in the discovery and reporting of such detections. Limited access to ePHI through controls, allowing only the persons or software programs that require access, and... Continue readingIs Windows RDP HIPAA Compliant and Secure?
One of the great blessings of technology has been an unprecedented ability to work remotely, and connect with teams and customers on a global scale. But for remote workers involved in the transfer of sensitive data and protected health information, particularly those that have business agreements in place to maintain HIPAA compliance, adhering to standards... Continue reading